원문정보
초록
영어
In order to get the security protocol implementations written in programming language from formal languages in secure way, firstly, the model of implementation generation from security protocol implementations written in formal language is presented; Apart from that, an automatic generator PV2JAVA is developed, which can transform security protocol implementations written in the Applied PI calculus proved in the symbolic model into security protocol implementations written in Java language ; Finally, the method of software testing is used to provide a strong confidence in the correctness of the automatic generator PV2JAVA through five typical security protocols.
목차
1. Introduction
2. Related Work
3. The Implementation Model from Security Protocol Implementations Written in Formal Language to Programming Language
4. The Mappings from Security Protocol Implementations Written in the Applied Pi Calculus to Java Language
5. PV2JAVA: Automatic Generator from Security ProtocolImplementations Written in the Applied PI Calculus to Java Language
6. PV2JAVA Applications on Typical Security Protocols
7. Conclusion
References