Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

The CL-atse protocol analyser

Identifieur interne : 000389 ( PascalFrancis/Corpus ); précédent : 000388; suivant : 000390

The CL-atse protocol analyser

Auteurs : Mathieu Turuani

Source :

RBID : Pascal:07-0517960

Descripteurs français

English descriptors

Abstract

This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w.r.t. the Dolev-Yao intruder. Any state-based security property can be modelled (like secrecy, authentication, fairness, etc...), and the algebraic properties of operators like xor or exponentiation are taken into account with much less limitations than other tools, thanks to a complete modular unification algorithm. Also, useful constraints like typing, inequalities, or shared sets of knowledge (with set operations like removes, negative tests, etc...) can also be analysed.

Notice en format standard (ISO 2709)

Pour connaître la documentation sur le format Inist Standard.

pA  
A01 01  1    @0 0302-9743
A05       @2 4098
A08 01  1  ENG  @1 The CL-atse protocol analyser
A09 01  1  ENG  @1 Term rewriting and applications : 17th international conference, RTA 2006, Seattle, WA, USA, August 12-14, 2006 : proceedings
A11 01  1    @1 TURUANI (Mathieu)
A12 01  1    @1 PFENNING (Frank) @9 ed.
A14 01      @1 Loria-INRIA @2 Vandoeuvre-lès-Nancy @3 FRA @Z 1 aut.
A20       @1 277-286
A21       @1 2006
A23 01      @0 ENG
A26 01      @0 3-540-36834-5
A43 01      @1 INIST @2 16343 @5 354000153621310210
A44       @0 0000 @1 © 2007 INIST-CNRS. All rights reserved.
A45       @0 16 ref.
A47 01  1    @0 07-0517960
A60       @1 P @2 C
A61       @0 A
A64 01  1    @0 Lecture notes in computer science
A66 01      @0 DEU
C01 01    ENG  @0 This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w.r.t. the Dolev-Yao intruder. Any state-based security property can be modelled (like secrecy, authentication, fairness, etc...), and the algebraic properties of operators like xor or exponentiation are taken into account with much less limitations than other tools, thanks to a complete modular unification algorithm. Also, useful constraints like typing, inequalities, or shared sets of knowledge (with set operations like removes, negative tests, etc...) can also be analysed.
C02 01  X    @0 001D02B07C
C02 02  X    @0 001D04A04E
C02 03  X    @0 001D02B02
C03 01  X  FRE  @0 Protocole transmission @5 06
C03 01  X  ENG  @0 Transmission protocol @5 06
C03 01  X  SPA  @0 Protocolo transmisión @5 06
C03 02  X  FRE  @0 Sécurité @5 07
C03 02  X  ENG  @0 Safety @5 07
C03 02  X  SPA  @0 Seguridad @5 07
C03 03  X  FRE  @0 Cryptographie @5 08
C03 03  X  ENG  @0 Cryptography @5 08
C03 03  X  SPA  @0 Criptografía @5 08
C03 04  X  FRE  @0 Compilateur @5 09
C03 04  X  ENG  @0 Compiler @5 09
C03 04  X  SPA  @0 Compilador @5 09
C03 05  3  FRE  @0 Analyse atteignabilité @5 10
C03 05  3  ENG  @0 Reachability analysis @5 10
C03 06  X  FRE  @0 Authentification @5 11
C03 06  X  ENG  @0 Authentication @5 11
C03 06  X  SPA  @0 Autenticación @5 11
C03 07  X  FRE  @0 Unification @5 12
C03 07  X  ENG  @0 Unification @5 12
C03 07  X  SPA  @0 Unificación @5 12
C03 08  3  FRE  @0 Théorie type @5 13
C03 08  3  ENG  @0 Type theory @5 13
C03 09  X  FRE  @0 Typage @5 14
C03 09  X  ENG  @0 Typing @5 14
C03 09  X  SPA  @0 Tipificación @5 14
C03 10  3  FRE  @0 Ingénierie connaissances @5 15
C03 10  3  ENG  @0 Knowledge engineering @5 15
C03 11  X  FRE  @0 Réécriture @5 18
C03 11  X  ENG  @0 Rewriting @5 18
C03 11  X  SPA  @0 Reescritura @5 18
C03 12  X  FRE  @0 Intrus @5 19
C03 12  X  ENG  @0 Intruder @5 19
C03 12  X  SPA  @0 Intruso @5 19
C03 13  X  FRE  @0 Secret @5 20
C03 13  X  ENG  @0 Secrecy @5 20
C03 13  X  SPA  @0 Secreto @5 20
C03 14  X  FRE  @0 Equité @5 21
C03 14  X  ENG  @0 Equity @5 21
C03 14  X  SPA  @0 Equidad @5 21
C03 15  X  FRE  @0 Contrainte inégalité @5 22
C03 15  X  ENG  @0 Inequality constraint @5 22
C03 15  X  SPA  @0 Constreñimiento desigualdad @5 22
C03 16  X  FRE  @0 Satisfaction contrainte @5 23
C03 16  X  ENG  @0 Constraint satisfaction @5 23
C03 16  X  SPA  @0 Satisfaccion restricción @5 23
C03 17  X  FRE  @0 Modélisation @5 24
C03 17  X  ENG  @0 Modeling @5 24
C03 17  X  SPA  @0 Modelización @5 24
C03 18  X  FRE  @0 Exponentiation @4 CD @5 96
C03 18  X  ENG  @0 Exponentiation @4 CD @5 96
C03 18  X  SPA  @0 Expositoración @4 CD @5 96
N21       @1 337
N44 01      @1 OTO
N82       @1 OTO
pR  
A30 01  1  ENG  @1 International Conference on Rewriting Techniques and Applications @2 17 @3 Seattle WA USA @4 2006

Format Inist (serveur)

NO : PASCAL 07-0517960 INIST
ET : The CL-atse protocol analyser
AU : TURUANI (Mathieu); PFENNING (Frank)
AF : Loria-INRIA/Vandoeuvre-lès-Nancy/France (1 aut.)
DT : Publication en série; Congrès; Niveau analytique
SO : Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4098; Pp. 277-286; Bibl. 16 ref.
LA : Anglais
EA : This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w.r.t. the Dolev-Yao intruder. Any state-based security property can be modelled (like secrecy, authentication, fairness, etc...), and the algebraic properties of operators like xor or exponentiation are taken into account with much less limitations than other tools, thanks to a complete modular unification algorithm. Also, useful constraints like typing, inequalities, or shared sets of knowledge (with set operations like removes, negative tests, etc...) can also be analysed.
CC : 001D02B07C; 001D04A04E; 001D02B02
FD : Protocole transmission; Sécurité; Cryptographie; Compilateur; Analyse atteignabilité; Authentification; Unification; Théorie type; Typage; Ingénierie connaissances; Réécriture; Intrus; Secret; Equité; Contrainte inégalité; Satisfaction contrainte; Modélisation; Exponentiation
ED : Transmission protocol; Safety; Cryptography; Compiler; Reachability analysis; Authentication; Unification; Type theory; Typing; Knowledge engineering; Rewriting; Intruder; Secrecy; Equity; Inequality constraint; Constraint satisfaction; Modeling; Exponentiation
SD : Protocolo transmisión; Seguridad; Criptografía; Compilador; Autenticación; Unificación; Tipificación; Reescritura; Intruso; Secreto; Equidad; Constreñimiento desigualdad; Satisfaccion restricción; Modelización; Expositoración
LO : INIST-16343.354000153621310210
ID : 07-0517960

Links to Exploration step

Pascal:07-0517960

Le document en format XML

<record>
<TEI>
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en" level="a">The CL-atse protocol analyser</title>
<author>
<name sortKey="Turuani, Mathieu" sort="Turuani, Mathieu" uniqKey="Turuani M" first="Mathieu" last="Turuani">Mathieu Turuani</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Loria-INRIA</s1>
<s2>Vandoeuvre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">INIST</idno>
<idno type="inist">07-0517960</idno>
<date when="2006">2006</date>
<idno type="stanalyst">PASCAL 07-0517960 INIST</idno>
<idno type="RBID">Pascal:07-0517960</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000389</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title xml:lang="en" level="a">The CL-atse protocol analyser</title>
<author>
<name sortKey="Turuani, Mathieu" sort="Turuani, Mathieu" uniqKey="Turuani M" first="Mathieu" last="Turuani">Mathieu Turuani</name>
<affiliation>
<inist:fA14 i1="01">
<s1>Loria-INRIA</s1>
<s2>Vandoeuvre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
<imprint>
<date when="2006">2006</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass>
<keywords scheme="KwdEn" xml:lang="en">
<term>Authentication</term>
<term>Compiler</term>
<term>Constraint satisfaction</term>
<term>Cryptography</term>
<term>Equity</term>
<term>Exponentiation</term>
<term>Inequality constraint</term>
<term>Intruder</term>
<term>Knowledge engineering</term>
<term>Modeling</term>
<term>Reachability analysis</term>
<term>Rewriting</term>
<term>Safety</term>
<term>Secrecy</term>
<term>Transmission protocol</term>
<term>Type theory</term>
<term>Typing</term>
<term>Unification</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr">
<term>Protocole transmission</term>
<term>Sécurité</term>
<term>Cryptographie</term>
<term>Compilateur</term>
<term>Analyse atteignabilité</term>
<term>Authentification</term>
<term>Unification</term>
<term>Théorie type</term>
<term>Typage</term>
<term>Ingénierie connaissances</term>
<term>Réécriture</term>
<term>Intrus</term>
<term>Secret</term>
<term>Equité</term>
<term>Contrainte inégalité</term>
<term>Satisfaction contrainte</term>
<term>Modélisation</term>
<term>Exponentiation</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w.r.t. the Dolev-Yao intruder. Any state-based security property can be modelled (like secrecy, authentication, fairness, etc...), and the algebraic properties of operators like xor or exponentiation are taken into account with much less limitations than other tools, thanks to a complete modular unification algorithm. Also, useful constraints like typing, inequalities, or shared sets of knowledge (with set operations like removes, negative tests, etc...) can also be analysed.</div>
</front>
</TEI>
<inist>
<standard h6="B">
<pA>
<fA01 i1="01" i2="1">
<s0>0302-9743</s0>
</fA01>
<fA05>
<s2>4098</s2>
</fA05>
<fA08 i1="01" i2="1" l="ENG">
<s1>The CL-atse protocol analyser</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG">
<s1>Term rewriting and applications : 17th international conference, RTA 2006, Seattle, WA, USA, August 12-14, 2006 : proceedings</s1>
</fA09>
<fA11 i1="01" i2="1">
<s1>TURUANI (Mathieu)</s1>
</fA11>
<fA12 i1="01" i2="1">
<s1>PFENNING (Frank)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01">
<s1>Loria-INRIA</s1>
<s2>Vandoeuvre-lès-Nancy</s2>
<s3>FRA</s3>
<sZ>1 aut.</sZ>
</fA14>
<fA20>
<s1>277-286</s1>
</fA20>
<fA21>
<s1>2006</s1>
</fA21>
<fA23 i1="01">
<s0>ENG</s0>
</fA23>
<fA26 i1="01">
<s0>3-540-36834-5</s0>
</fA26>
<fA43 i1="01">
<s1>INIST</s1>
<s2>16343</s2>
<s5>354000153621310210</s5>
</fA43>
<fA44>
<s0>0000</s0>
<s1>© 2007 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45>
<s0>16 ref.</s0>
</fA45>
<fA47 i1="01" i2="1">
<s0>07-0517960</s0>
</fA47>
<fA60>
<s1>P</s1>
<s2>C</s2>
</fA60>
<fA61>
<s0>A</s0>
</fA61>
<fA64 i1="01" i2="1">
<s0>Lecture notes in computer science</s0>
</fA64>
<fA66 i1="01">
<s0>DEU</s0>
</fA66>
<fC01 i1="01" l="ENG">
<s0>This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w.r.t. the Dolev-Yao intruder. Any state-based security property can be modelled (like secrecy, authentication, fairness, etc...), and the algebraic properties of operators like xor or exponentiation are taken into account with much less limitations than other tools, thanks to a complete modular unification algorithm. Also, useful constraints like typing, inequalities, or shared sets of knowledge (with set operations like removes, negative tests, etc...) can also be analysed.</s0>
</fC01>
<fC02 i1="01" i2="X">
<s0>001D02B07C</s0>
</fC02>
<fC02 i1="02" i2="X">
<s0>001D04A04E</s0>
</fC02>
<fC02 i1="03" i2="X">
<s0>001D02B02</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE">
<s0>Protocole transmission</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG">
<s0>Transmission protocol</s0>
<s5>06</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA">
<s0>Protocolo transmisión</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE">
<s0>Sécurité</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG">
<s0>Safety</s0>
<s5>07</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA">
<s0>Seguridad</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE">
<s0>Cryptographie</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG">
<s0>Cryptography</s0>
<s5>08</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA">
<s0>Criptografía</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE">
<s0>Compilateur</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG">
<s0>Compiler</s0>
<s5>09</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA">
<s0>Compilador</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="3" l="FRE">
<s0>Analyse atteignabilité</s0>
<s5>10</s5>
</fC03>
<fC03 i1="05" i2="3" l="ENG">
<s0>Reachability analysis</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE">
<s0>Authentification</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG">
<s0>Authentication</s0>
<s5>11</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA">
<s0>Autenticación</s0>
<s5>11</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE">
<s0>Unification</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG">
<s0>Unification</s0>
<s5>12</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA">
<s0>Unificación</s0>
<s5>12</s5>
</fC03>
<fC03 i1="08" i2="3" l="FRE">
<s0>Théorie type</s0>
<s5>13</s5>
</fC03>
<fC03 i1="08" i2="3" l="ENG">
<s0>Type theory</s0>
<s5>13</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE">
<s0>Typage</s0>
<s5>14</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG">
<s0>Typing</s0>
<s5>14</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA">
<s0>Tipificación</s0>
<s5>14</s5>
</fC03>
<fC03 i1="10" i2="3" l="FRE">
<s0>Ingénierie connaissances</s0>
<s5>15</s5>
</fC03>
<fC03 i1="10" i2="3" l="ENG">
<s0>Knowledge engineering</s0>
<s5>15</s5>
</fC03>
<fC03 i1="11" i2="X" l="FRE">
<s0>Réécriture</s0>
<s5>18</s5>
</fC03>
<fC03 i1="11" i2="X" l="ENG">
<s0>Rewriting</s0>
<s5>18</s5>
</fC03>
<fC03 i1="11" i2="X" l="SPA">
<s0>Reescritura</s0>
<s5>18</s5>
</fC03>
<fC03 i1="12" i2="X" l="FRE">
<s0>Intrus</s0>
<s5>19</s5>
</fC03>
<fC03 i1="12" i2="X" l="ENG">
<s0>Intruder</s0>
<s5>19</s5>
</fC03>
<fC03 i1="12" i2="X" l="SPA">
<s0>Intruso</s0>
<s5>19</s5>
</fC03>
<fC03 i1="13" i2="X" l="FRE">
<s0>Secret</s0>
<s5>20</s5>
</fC03>
<fC03 i1="13" i2="X" l="ENG">
<s0>Secrecy</s0>
<s5>20</s5>
</fC03>
<fC03 i1="13" i2="X" l="SPA">
<s0>Secreto</s0>
<s5>20</s5>
</fC03>
<fC03 i1="14" i2="X" l="FRE">
<s0>Equité</s0>
<s5>21</s5>
</fC03>
<fC03 i1="14" i2="X" l="ENG">
<s0>Equity</s0>
<s5>21</s5>
</fC03>
<fC03 i1="14" i2="X" l="SPA">
<s0>Equidad</s0>
<s5>21</s5>
</fC03>
<fC03 i1="15" i2="X" l="FRE">
<s0>Contrainte inégalité</s0>
<s5>22</s5>
</fC03>
<fC03 i1="15" i2="X" l="ENG">
<s0>Inequality constraint</s0>
<s5>22</s5>
</fC03>
<fC03 i1="15" i2="X" l="SPA">
<s0>Constreñimiento desigualdad</s0>
<s5>22</s5>
</fC03>
<fC03 i1="16" i2="X" l="FRE">
<s0>Satisfaction contrainte</s0>
<s5>23</s5>
</fC03>
<fC03 i1="16" i2="X" l="ENG">
<s0>Constraint satisfaction</s0>
<s5>23</s5>
</fC03>
<fC03 i1="16" i2="X" l="SPA">
<s0>Satisfaccion restricción</s0>
<s5>23</s5>
</fC03>
<fC03 i1="17" i2="X" l="FRE">
<s0>Modélisation</s0>
<s5>24</s5>
</fC03>
<fC03 i1="17" i2="X" l="ENG">
<s0>Modeling</s0>
<s5>24</s5>
</fC03>
<fC03 i1="17" i2="X" l="SPA">
<s0>Modelización</s0>
<s5>24</s5>
</fC03>
<fC03 i1="18" i2="X" l="FRE">
<s0>Exponentiation</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="18" i2="X" l="ENG">
<s0>Exponentiation</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fC03 i1="18" i2="X" l="SPA">
<s0>Expositoración</s0>
<s4>CD</s4>
<s5>96</s5>
</fC03>
<fN21>
<s1>337</s1>
</fN21>
<fN44 i1="01">
<s1>OTO</s1>
</fN44>
<fN82>
<s1>OTO</s1>
</fN82>
</pA>
<pR>
<fA30 i1="01" i2="1" l="ENG">
<s1>International Conference on Rewriting Techniques and Applications</s1>
<s2>17</s2>
<s3>Seattle WA USA</s3>
<s4>2006</s4>
</fA30>
</pR>
</standard>
<server>
<NO>PASCAL 07-0517960 INIST</NO>
<ET>The CL-atse protocol analyser</ET>
<AU>TURUANI (Mathieu); PFENNING (Frank)</AU>
<AF>Loria-INRIA/Vandoeuvre-lès-Nancy/France (1 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2006; Vol. 4098; Pp. 277-286; Bibl. 16 ref.</SO>
<LA>Anglais</LA>
<EA>This paper presents an overview of the CL-Atse tool, an efficient and versatile automatic analyser for the security of cryptographic protocols. CL-Atse takes as input a protocol specified as a set of rewriting rules (IF format, produced by the AVISPA compiler), and uses rewriting and constraint solving techniques to model all reachable states of the participants and decide if an attack exists w.r.t. the Dolev-Yao intruder. Any state-based security property can be modelled (like secrecy, authentication, fairness, etc...), and the algebraic properties of operators like xor or exponentiation are taken into account with much less limitations than other tools, thanks to a complete modular unification algorithm. Also, useful constraints like typing, inequalities, or shared sets of knowledge (with set operations like removes, negative tests, etc...) can also be analysed.</EA>
<CC>001D02B07C; 001D04A04E; 001D02B02</CC>
<FD>Protocole transmission; Sécurité; Cryptographie; Compilateur; Analyse atteignabilité; Authentification; Unification; Théorie type; Typage; Ingénierie connaissances; Réécriture; Intrus; Secret; Equité; Contrainte inégalité; Satisfaction contrainte; Modélisation; Exponentiation</FD>
<ED>Transmission protocol; Safety; Cryptography; Compiler; Reachability analysis; Authentication; Unification; Type theory; Typing; Knowledge engineering; Rewriting; Intruder; Secrecy; Equity; Inequality constraint; Constraint satisfaction; Modeling; Exponentiation</ED>
<SD>Protocolo transmisión; Seguridad; Criptografía; Compilador; Autenticación; Unificación; Tipificación; Reescritura; Intruso; Secreto; Equidad; Constreñimiento desigualdad; Satisfaccion restricción; Modelización; Expositoración</SD>
<LO>INIST-16343.354000153621310210</LO>
<ID>07-0517960</ID>
</server>
</inist>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000389 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000389 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    PascalFrancis
   |étape=   Corpus
   |type=    RBID
   |clé=     Pascal:07-0517960
   |texte=   The CL-atse protocol analyser
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022