메뉴 건너뛰기




Volumn 19, Issue 1, 2017, Pages 138-153

Automatic generation of security protocol implementations written in java from abstract specifications proved in the computational model

Author keywords

Code generation; Code security; Protocol security; Security protocol

Indexed keywords

CALCULATIONS; CODES (SYMBOLS); COMPUTATION THEORY; COMPUTATIONAL METHODS; SPECIFICATIONS;

EID: 85014078012     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: 10.6633/IJNS.201701.19(1).15     Document Type: Article
Times cited : (4)

References (18)
  • 1
    • 84891883665 scopus 로고    scopus 로고
    • Formal verification of security protocol implementations: A survey
    • M. Avalle, A. Pironti, and R. Sisto, "Formal verification of security protocol implementations: a survey," Formal Aspects of Computing, vol. 26, no. 1, pp. 99123, 2014.
    • (2014) Formal Aspects of Computing , vol.26 , Issue.1 , pp. 99123
    • Avalle, M.1    Pironti, A.2    Sisto, R.3
  • 3
    • 84859450172 scopus 로고    scopus 로고
    • On the development and formalization of an extensible code generator for real life security protocols
    • Norfolk, USA, Apr
    • M. Backes, A. Buseniusl, and C. Hritcu, "On the development and formalization of an extensible code generator for real life security protocols," in Proceeding of The 4th International Conference on NASA Formal Methods, pp. 371-387, Norfolk, USA, Apr. 2012.
    • (2012) Proceeding of The 4th International Conference on NASA Formal Methods , pp. 371-387
    • Backes, M.1    Buseniusl, A.2    Hritcu, C.3
  • 4
    • 55949087657 scopus 로고    scopus 로고
    • A computationally sound mechanized prover for security protocols
    • B. Blanchet, "A computationally sound mechanized prover for security protocols," IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 4, pp. 193-207, 2008.
    • (2008) IEEE Transactions on Dependable and Secure Computing , vol.5 , Issue.4 , pp. 193-207
    • Blanchet, B.1
  • 7
    • 84936762208 scopus 로고    scopus 로고
    • Proved generation of implementations from computationally secure protocol specifications1
    • D. Cade and B. Blanchet, "Proved generation of implementations from computationally secure protocol specifications1," Journal of Computer Security, vol. 23, no. 3, pp. 331-402, 2015.
    • (2015) Journal of Computer Security , vol.23 , Issue.3 , pp. 331-402
    • Cade, D.1    Blanchet, B.2
  • 10
    • 84953318282 scopus 로고    scopus 로고
    • Improved methods and principles for designing and analyzing security protocols
    • A. Kartit, H. K. Idrissi, and M. Belkhouraf, "Improved methods and principles for designing and analyzing security protocols," International Journal of Network Security, vol. 18, no. 3, pp. 523-528, 2016.
    • (2016) International Journal of Network Security , vol.18 , Issue.3 , pp. 523-528
    • Kartit, A.1    Idrissi, H.K.2    Belkhouraf, M.3
  • 11
    • 84868246509 scopus 로고    scopus 로고
    • Multi-language oriented automatic realization method for cryptographic protocols
    • X. H. Li, D. Li, S. T. Li, and J. F. Ma, "Multi-language oriented automatic realization method for cryptographic protocols," Journal on Communications, vol. 33, no. 9, pp. 152-159, 2012.
    • (2012) Journal on Communications , vol.33 , Issue.9 , pp. 152-159
    • Li, X.H.1    Li, D.2    Li, S.T.3    Ma, J.F.4
  • 12
    • 84908245464 scopus 로고    scopus 로고
    • Mechanized verification of cryptographic security of cryptographic security protocol implementation in java through model extraction in the computational model
    • B. Meng, Z. M. Li, and W. Chen, "Mechanized verification of cryptographic security of cryptographic security protocol implementation in java through model extraction in the computational model," Journal of Software Engineering, vol. 9, no. 1, pp. 1-32, 2015.
    • (2015) Journal of Software Engineering , vol.9 , Issue.1 , pp. 1-32
    • Meng, B.1    Li, Z.M.2    Chen, W.3
  • 13
    • 84921695016 scopus 로고    scopus 로고
    • Efficient java code generation of security protocols specified in anb/anbx
    • Wroclaw, Poland, Sep
    • P. Modesti, "Efficient java code generation of security protocols specified in anb/anbx," in the 10th International Workshop on Security and Trust Management, pp. 204-208, Wroclaw, Poland, Sep. 2014.
    • (2014) the 10th International Workshop on Security and Trust Management , pp. 204-208
    • Modesti, P.1
  • 14
    • 84857355689 scopus 로고    scopus 로고
    • Formally based semi-automatic implementation of an open security protocol
    • A. Pironti, D. Pozza, and R. Sisto, "Formally based semi-automatic implementation of an open security protocol," Journal of Systems and Software, vol. 85, no. 4, pp. 835-849, 2012.
    • (2012) Journal of Systems and Software , vol.85 , Issue.4 , pp. 835-849
    • Pironti, A.1    Pozza, D.2    Sisto, R.3
  • 15
    • 84891887538 scopus 로고    scopus 로고
    • Safe abstractions of data encodings in formal security protocol models
    • A. Pironti and R. Sisto, "Safe abstractions of data encodings in formal security protocol models," Formal Aspects of Computing, vol. 26, no. 1, pp. 125-167, 2014.
    • (2014) Formal Aspects of Computing , vol.26 , Issue.1 , pp. 125-167
    • Pironti, A.1    Sisto, R.2
  • 16
    • 77949567843 scopus 로고    scopus 로고
    • Provably correct java implementations of spi calculus security protocols specifications
    • A. Pirontia and R. Sisto, "Provably correct java implementations of spi calculus security protocols specifications," Computers & Security, vol. 29, no. 3, pp. 302-314, 2010.
    • (2010) Computers & Security , vol.29 , Issue.3 , pp. 302-314
    • Pirontia, A.1    Sisto, R.2
  • 17
    • 84947086841 scopus 로고    scopus 로고
    • A lightweight rfid security protocol based on elliptic curve cryptography
    • Q. Qian and Y. Long, J. R. Zhang, "A lightweight rfid security protocol based on elliptic curve cryptography," International Journal of Network Security, vol. 18, no. 2, pp. 354-361, 2016.
    • (2016) International Journal of Network Security , vol.18 , Issue.2 , pp. 354-361
    • Qian, Q.1    Long, Y.2    Zhang, J.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.