Rule-based Programs describing Internet Security Protocols
Identifieur interne : 006784 ( Main/Exploration ); précédent : 006783; suivant : 006785Rule-based Programs describing Internet Security Protocols
Auteurs : Yannick Chevalier ; Laurent VigneronSource :
English descriptors
- KwdEn :
Abstract
We present a low-level specification language used for describing real Internet security protocols. Specifications are automatically generated by a compiler, from TLA-based high-level descriptions of the protocols. The results are rule-based programs containing all the information needed for either implementing the protocols, or verifying some security properties. This approach has already been applied to several well-known Internet security protocols, and the generated programs have been successfully used for finding some attacks.
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Crin, to step Corpus: 003F49
- to stream Crin, to step Curation: 003F49
- to stream Crin, to step Checkpoint: 000612
- to stream Main, to step Merge: 006A87
- to stream Main, to step Curation: 006784
Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en" wicri:score="90">Rule-based Programs describing Internet Security Protocols</title>
</titleStmt>
<publicationStmt><idno type="RBID">CRIN:chevalier04e</idno>
<date when="2004" year="2004">2004</date>
<idno type="wicri:Area/Crin/Corpus">003F49</idno>
<idno type="wicri:Area/Crin/Curation">003F49</idno>
<idno type="wicri:explorRef" wicri:stream="Crin" wicri:step="Curation">003F49</idno>
<idno type="wicri:Area/Crin/Checkpoint">000612</idno>
<idno type="wicri:explorRef" wicri:stream="Crin" wicri:step="Checkpoint">000612</idno>
<idno type="wicri:Area/Main/Merge">006A87</idno>
<idno type="wicri:Area/Main/Curation">006784</idno>
<idno type="wicri:Area/Main/Exploration">006784</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en">Rule-based Programs describing Internet Security Protocols</title>
<author><name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
</author>
<author><name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
</author>
</analytic>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Internet</term>
<term>protocols</term>
<term>specification</term>
<term>term rewriting</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en" wicri:score="1380">We present a low-level specification language used for describing real Internet security protocols. Specifications are automatically generated by a compiler, from TLA-based high-level descriptions of the protocols. The results are rule-based programs containing all the information needed for either implementing the protocols, or verifying some security properties. This approach has already been applied to several well-known Internet security protocols, and the generated programs have been successfully used for finding some attacks.</div>
</front>
</TEI>
<affiliations><list></list>
<tree><noCountry><name sortKey="Chevalier, Yannick" sort="Chevalier, Yannick" uniqKey="Chevalier Y" first="Yannick" last="Chevalier">Yannick Chevalier</name>
<name sortKey="Vigneron, Laurent" sort="Vigneron, Laurent" uniqKey="Vigneron L" first="Laurent" last="Vigneron">Laurent Vigneron</name>
</noCountry>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 006784 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 006784 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Main |étape= Exploration |type= RBID |clé= CRIN:chevalier04e |texte= Rule-based Programs describing Internet Security Protocols }}
This area was generated with Dilib version V0.6.33. |