메뉴 건너뛰기




Volumn 29, Issue 3, 2010, Pages 302-314

Provably correct Java implementations of Spi Calculus security protocols specifications

Author keywords

Code verification; Correctness preserving code generation; Formal methods; Model based software development; Security protocols

Indexed keywords

CODE GENERATION; CODE VERIFICATION; CORRECTNESS PRESERVING CODE GENERATION; MODEL-BASED; SECURITY PROTOCOLS; SOFTWARE DEVELOPMENT;

EID: 77949567843     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.08.001     Document Type: Article
Times cited : (20)

References (29)
  • 1
    • 24344493908 scopus 로고    scopus 로고
    • Computer-assisted verification of a protocol for certified email
    • Abadi M., and Blanchet B. Computer-assisted verification of a protocol for certified email. Science of Computer Programming 58 1-2 (2005) 3-27
    • (2005) Science of Computer Programming , vol.58 , Issue.1-2 , pp. 3-27
    • Abadi, M.1    Blanchet, B.2
  • 2
    • 2942563373 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols the spi calculus
    • Abadi M., and Gordon A.D. A calculus for cryptographic protocols the spi calculus. Digital SRC Research Report 149 (1998)
    • (1998) Digital SRC Research Report , vol.149
    • Abadi, M.1    Gordon, A.D.2
  • 11
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. In: IEEE Computer Security Foundations Workshop; 2001. pp. 82-96.
    • (2001) IEEE Computer Security Foundations Workshop , pp. 82-96
    • Blanchet, B.1
  • 14
    • 24144470036 scopus 로고    scopus 로고
    • Goubault-Larrecq J, Parrennes F. Cryptographic protocol analysis on real C code. In: Verification, Model Checking, and Abstract Interpretation; 2005. pp. 363-79.
    • Goubault-Larrecq J, Parrennes F. Cryptographic protocol analysis on real C code. In: Verification, Model Checking, and Abstract Interpretation; 2005. pp. 363-79.
  • 15
    • 24144433896 scopus 로고    scopus 로고
    • Implementing a formally verifiable security protocol in java card
    • Hubbers E, Oostdijk M, Poll E. Implementing a formally verifiable security protocol in java card. In: Security in Pervasive Computing; 2003. pp. 213-26.
    • (2003) Security in Pervasive Computing , pp. 213-226
    • Hubbers, E.1    Oostdijk, M.2    Poll, E.3
  • 17
    • 33744474077 scopus 로고    scopus 로고
    • Jeon CW, Kim IG, Choi JY. Automatic generation of the C# code for security protocols verified with casper/FDR. In: International Conference on Advanced Information Networking and Applications; 2005. pp. 507-10.
    • Jeon CW, Kim IG, Choi JY. Automatic generation of the C# code for security protocols verified with casper/FDR. In: International Conference on Advanced Information Networking and Applications; 2005. pp. 507-10.
  • 18
    • 33745178885 scopus 로고    scopus 로고
    • Verification of low-level crypto-protocol implementations using automated theorem proving
    • Jürjens J. Verification of low-level crypto-protocol implementations using automated theorem proving. In: Formal Methods and Models for Co-Design; 2005. pp. 89-98.
    • (2005) Formal Methods and Models for Co-Design , pp. 89-98
    • Jürjens, J.1
  • 19
  • 22
    • 48049092340 scopus 로고    scopus 로고
    • An experiment in interoperable cryptographic protocol implementation using automatic code generation
    • Pironti A, Sisto R. An experiment in interoperable cryptographic protocol implementation using automatic code generation. In: IEEE Symposium on Computers and Communications; 2007. pp. 839-44.
    • (2007) IEEE Symposium on Computers and Communications , pp. 839-844
    • Pironti, A.1    Sisto, R.2
  • 23
    • 58449090669 scopus 로고    scopus 로고
    • Formally sound refinement of Spi Calculus protocol specifications into Java code
    • Pironti A, Sisto R. Formally sound refinement of Spi Calculus protocol specifications into Java code. In: IEEE High Assurance Systems Engineering Symposium; 2008a. pp. 241-50.
    • (2008) IEEE High Assurance Systems Engineering Symposium , pp. 241-250
    • Pironti, A.1    Sisto, R.2
  • 26
    • 3042621964 scopus 로고    scopus 로고
    • Pozza D, Sisto R, Durante L. Spi2java: automatic cryptographic protocol java code generation from spi calculus. In: International Conference on Advanced Information Networking and Applications; 2004. pp. 400-05.
    • Pozza D, Sisto R, Durante L. Spi2java: automatic cryptographic protocol java code generation from spi calculus. In: International Conference on Advanced Information Networking and Applications; 2004. pp. 400-05.
  • 28
    • 18144362508 scopus 로고    scopus 로고
    • ASM refinement and generalizations of forward simulation in data refinement: a comparison
    • Schellhorn G. ASM refinement and generalizations of forward simulation in data refinement: a comparison. Theoretical Computer Science 336 2-3 (2005) 403-435
    • (2005) Theoretical Computer Science , vol.336 , Issue.2-3 , pp. 403-435
    • Schellhorn, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.