메뉴 건너뛰기




Volumn 85, Issue 4, 2012, Pages 835-849

Formally based semi-automatic implementation of an open security protocol

Author keywords

Automatic code generation; Model driven development; Security protocols; Spi2Java

Indexed keywords

ABSTRACT LEVELS; AUTOMATIC CODE GENERATIONS; EXECUTION TIME; JAVA IMPLEMENTATION; MODEL DRIVEN APPROACH; MODEL-DRIVEN-DEVELOPMENT; SECURITY PROTOCOLS; SEMI-AUTOMATICS; SPI2JAVA; THIRD PARTIES; TRANSPORT LAYER PROTOCOLS;

EID: 84857355689     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.10.052     Document Type: Article
Times cited : (12)

References (42)
  • 1
    • 0003761061 scopus 로고    scopus 로고
    • A calculus for cryptographic protocols: The spi calculus
    • Abadi, M.; Gordon, A.D.; 1998. A calculus for cryptographic protocols: the spi calculus. Research Report 149.
    • (1998) Research Report 149
    • Abadi, M.1    Gordon, A.D.2
  • 7
    • 33947683919 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • DOI 10.1109/CSFW.2006.32, 1648714, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
    • Bhargavan K.; Fournet C.; Gordon A.D.; and Tse S. Verified interoperable implementations of security protocols Computer Security Foundations Workshop 2006 IEEE Computer Society 139 152 (Pubitemid 46499723)
    • (2006) Proceedings of the Computer Security Foundations Workshop , vol.2006 , pp. 139-152
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Tse, S.4
  • 13
    • 38649141810 scopus 로고    scopus 로고
    • Automated verification of selected equivalences for security protocols
    • DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
    • Blanchet B.; Abadi M.; and Fournet C. Automated verification of selected equivalences for security protocols Journal of Logic and Algebraic Programming 75 1 2008 3 51 (Pubitemid 351172997)
    • (2008) Journal of Logic and Algebraic Programming , vol.75 , Issue.1 , pp. 3-51
    • Blanchet, B.1    Abadi, M.2    Fournet, C.3
  • 14
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE Computer Society
    • Bhargavan B. An efficient cryptographic protocol verifier based on prolog rules Computer Security Foundations Workshop 2001 IEEE Computer Society 82 96
    • (2001) Computer Security Foundations Workshop , pp. 82-96
    • Bhargavan, B.1
  • 16
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • Blanchet B. A computationally sound mechanized prover for security protocols IEEE Transactions on Dependable and Secure Computing 5 4 2008 193 207
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 18
    • 3042538976 scopus 로고    scopus 로고
    • Automatic testing equivalence verification of spi calculus specifications
    • DOI 10.1145/941566.941570
    • Durante L.; Sisto R.; and Valenzano A. Automatic testing equivalence verification of spi calculus specifications ACM Transactions on Software Engineering and Methodology 12 2 2003 222 284 (Pubitemid 44159309)
    • (2003) ACM Transactions on Software Engineering and Methodology , vol.12 , Issue.2 , pp. 222-284
    • Durante, L.1    Sisto, R.2    Valenzano, A.3
  • 20
    • 47249152310 scopus 로고    scopus 로고
    • Verification of Mondex electronic purses with KIV: From a security protocol to verified code
    • Springer
    • Grandy H.; Bischof M.; Stenzel K.; Schellhorn G.; and Reif W. Verification of Mondex electronic purses with KIV: from a security protocol to verified code Formal Methods, LNCS 5014 2008 Springer 165 180
    • (2008) Formal Methods, LNCS 5014 , pp. 165-180
    • Grandy, H.1    Bischof, M.2    Stenzel, K.3    Schellhorn, G.4    Reif, W.5
  • 22
    • 69249215281 scopus 로고    scopus 로고
    • Automated security verification for crypto protocol implementations: Verifying the Jessie project
    • ISSN 1571-0661, doi:10.1016/j.entcs.2009.08.009
    • Jürjens J. Automated security verification for crypto protocol implementations: verifying the Jessie project Electronic Notes in Theoretical Computer Science 250 2009 123 136 ISSN 1571-0661, doi:10.1016/j.entcs.2009.08. 009
    • (2009) Electronic Notes in Theoretical Computer Science , vol.250 , pp. 123-136
    • Jürjens, J.1
  • 24
    • 33744474077 scopus 로고    scopus 로고
    • Automatic generation of the C# code for security protocols verified with casper/FDR
    • DOI 10.1109/AINA.2005.128, 1423744, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
    • Jeon C.-W.; Kim I.-G.; and Choi J.-Y. Automatic generation of the C# code for security protocols verified with Casper/FDR International Conference on Advanced Information Networking and Applications 2005 IEEE Computer Society 507 510 (Pubitemid 43804079)
    • (2005) Proceedings - International Conference on Advanced Information Networking and Applications, AINA , vol.2 , pp. 507-510
    • Jeon, C.-W.1    Kim, I.-G.2    Choi, T.-Y.3
  • 26
    • 0030708255 scopus 로고    scopus 로고
    • A hierarchy of authentication specifications
    • IEEE Computer Society
    • Lowe G. A hierarchy of authentication specifications Computer Security Foundations Workshop 1997 IEEE Computer Society 31 43
    • (1997) Computer Security Foundations Workshop , pp. 31-43
    • Lowe, G.1
  • 27
    • 0031633395 scopus 로고    scopus 로고
    • Casper: A compiler for the analysis of security protocols
    • Lowe G. Casper: a compiler for the analysis of security protocols Journal of Computer Security 6 1-2 1998 53 84
    • (1998) Journal of Computer Security , vol.6 , Issue.12 , pp. 53-84
    • Lowe, G.1
  • 28
    • 70349335930 scopus 로고    scopus 로고
    • The open-source fixed-point model checker for symbolic analysis of security protocols
    • Springer
    • Mödersheim S.; and Vigan L. The open-source fixed-point model checker for symbolic analysis of security protocols Foundations of Security Analysis and Design, LNCS 5705 2009 Springer 166 194
    • (2009) Foundations of Security Analysis and Design, LNCS 5705 , pp. 166-194
    • Mödersheim, S.1    Vigan, L.2
  • 30
    • 33745606237 scopus 로고    scopus 로고
    • Visual security protocol modeling
    • Proceedings New Security Paradigms Workshop 2005
    • McDermott J. Visual security protocol modeling Workshop on New Security Paradigms 2005 ACM 97 109 (Pubitemid 43990981)
    • (2006) Proceedings New Security Paradigms Workshop , vol.2006 , pp. 97-109
    • McDermott, J.1
  • 33
    • 48049092340 scopus 로고    scopus 로고
    • An experiment in interoperable cryptographic protocol implementation using automatic code generation
    • IEEE Computer Society
    • Pironti A.; and Sisto R. An experiment in interoperable cryptographic protocol implementation using automatic code generation IEEE Symposium on Computers and Communications 2007 IEEE Computer Society 839 844
    • (2007) IEEE Symposium on Computers and Communications , pp. 839-844
    • Pironti, A.1    Sisto, R.2
  • 34
    • 49049110544 scopus 로고    scopus 로고
    • Soundness conditions for message encoding abstractions in formal security protocol models
    • IEEE Computer Society
    • Pironti A.; and Sisto R. Soundness conditions for message encoding abstractions in formal security protocol models Availability, Reliability and Security 2008 IEEE Computer Society 72 79
    • (2008) Availability, Reliability and Security , pp. 72-79
    • Pironti, A.1    Sisto, R.2
  • 35
    • 77949567843 scopus 로고    scopus 로고
    • Provably correct Java implementations of spi calculus security protocols specifications
    • Pironti A.; and Sisto R. Provably correct Java implementations of spi calculus security protocols specifications Computers & Security 29 3 2010 302 314
    • (2010) Computers & Security , vol.29 , Issue.3 , pp. 302-314
    • Pironti, A.1    Sisto, R.2
  • 39
    • 84958777572 scopus 로고    scopus 로고
    • AGVI - Automatic Generation, Verification, and Implementation of Security Protocols
    • Computer Aided Verification
    • Song D.X.; Perrig A.; and Phan D. AGVI - automatic generation, verification, and implementation of security protocols International Conference on Computer Aided Verification 2001 Springer 241 245 (Pubitemid 33312919)
    • (2001) LNCS , Issue.2102 , pp. 241-245
    • Song, D.1    Perrig, A.2    Phan, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.