AnBx: Automatic generation and verification of security protocols implementations

被引:0
|
作者
School of Computing Science, Newcastle University, Newcastle upon Tyne, United Kingdom [1 ]
机构
来源
关键词
Engineering Village;
D O I
暂无
中图分类号
学科分类号
摘要
Abstract modeling - Automatic Generation - Consistency checks - Java codes - Java implementation - Model driven development approaches - Security goals - Security protocols
引用
收藏
相关论文
共 50 条
  • [1] AnBx: Automatic Generation and Verification of Security Protocols Implementations
    Modesti, Paolo
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015), 2016, 9482 : 156 - 173
  • [2] AnBx - Security Protocols Design and Verification
    Bugliesi, Michele
    Modesti, Paolo
    AUTOMATED REASONING FOR SECURITY PROTOCOL ANALYSIS AND ISSUES IN THE THEORY OF SECURITY, 2010, 6186 : 164 - 184
  • [3] AGVI - Automatic generation, verification, and implementation of security protocols
    Song, D
    Perrig, A
    Phan, D
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 241 - 245
  • [4] Efficient java code generation of security protocols specified in AnB/AnBx
    Modesti, Paolo
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8743 : 204 - 208
  • [5] Security protocol specification and verification with AnBx
    Bugliesi, Michele
    Calzavara, Stefano
    Modersheim, Sebastian
    Modesti, Paolo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 30 : 46 - 63
  • [6] Efficient Java']Java Code Generation of Security Protocols Specified in AnB/AnBx
    Modesti, Paolo
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 204 - 208
  • [7] Automatic Verification of Simulatability in Security Protocols
    Araragi, Tadashi
    Pereira, Olivier
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 275 - +
  • [8] Automatic verification of correspondences for security protocols
    Blanchet, Bruno
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (04) : 363 - 434
  • [9] Formal automatic verification of security protocols
    Xiao, Meihua
    Xue, Jinyun
    2006 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, 2006, : 566 - +
  • [10] Sound Verification of Security Protocols: From Design to Interoperable Implementations
    Arquint, Linard
    Wolf, Felix A.
    Lallemand, Joseph
    Sasse, Ralf
    Sprenger, Christoph
    Wiesner, Sven N.
    Basin, David
    Mueller, Peter
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 1077 - 1093