The AVISPA tool for the automated validation of internet security protocols and applications
Identifieur interne : 000544 ( PascalFrancis/Corpus ); précédent : 000543; suivant : 000545The AVISPA tool for the automated validation of internet security protocols and applications
Auteurs : A. Armando ; D. Basin ; Y. Boichut ; Y. Chevalier ; L. Compagna ; J. Cuellar ; P. Hankes Drielsma ; P. C. Heam ; O. Kouchnarenko ; J. Mantovani ; S. Mödersheim ; D. Von Oheimb ; M. Rusinowitch ; J. Santiago ; M. Turuani ; L. Vigano ; L. VigneronSource :
- Lecture notes in computer science [ 0302-9743 ] ; 2005.
Descripteurs français
- Pascal (Inist)
English descriptors
- KwdEn :
Abstract
AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.
Notice en format standard (ISO 2709)
Pour connaître la documentation sur le format Inist Standard.
pA |
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
pR |
|
Format Inist (serveur)
NO : | PASCAL 05-0349048 INIST |
---|---|
ET : | The AVISPA tool for the automated validation of internet security protocols and applications |
AU : | ARMANDO (A.); BASIN (D.); BOICHUT (Y.); CHEVALIER (Y.); COMPAGNA (L.); CUELLAR (J.); DRIELSMA (P. Hankes); HEAM (P. C.); KOUCHNARENKO (O.); MANTOVANI (J.); MÖDERSHEIM (S.); VON OHEIMB (D.); RUSINOWITCH (M.); SANTIAGO (J.); TURUANI (M.); VIGANO (L.); VIGNERON (L.); ETESSAMI (Kousha); RAJAMANI (Sriram K.) |
AF : | AI-Lab, DIST, Università di Genova/Italie (1 aut., 5 aut., 10 aut.); Information Security Group, ETH Zurich/Suisse (2 aut., 7 aut., 11 aut., 16 aut.); LIFC, Université de Franche-Comté/Besancon/France (3 aut., 8 aut., 9 aut.); LORIA-INRIA-Lorraine/Nancy/France (4 aut., 13 aut., 14 aut., 15 aut., 17 aut.); Siemens AG, CT IC 3/Munich/Allemagne (6 aut., 12 aut.) |
DT : | Publication en série; Congrès; Niveau analytique |
SO : | Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2005; Vol. 3576; Pp. 281-285; Bibl. 14 ref. |
LA : | Anglais |
EA : | AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability. |
CC : | 001D02B04; 001D02B09 |
FD : | Vérification programme; Protocole internet; Protocole transmission; Sécurité; Langage formel; Extensibilité; Validation; Analyse automatique; Robustesse |
ED : | Program verification; Internet protocol; Transmission protocol; Safety; Formal language; Scalability; Validation; Automatic analysis; Robustness |
SD : | Verificación programa; Protocolo internet; Protocolo transmisión; Seguridad; Lenguaje formal; Estensibilidad; Validación; Análisis automático; Robustez |
LO : | INIST-16343.354000124488910260 |
ID : | 05-0349048 |
Links to Exploration step
Pascal:05-0349048Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en" level="a">The AVISPA tool for the automated validation of internet security protocols and applications</title>
<author><name sortKey="Armando, A" sort="Armando, A" uniqKey="Armando A" first="A." last="Armando">A. Armando</name>
<affiliation><inist:fA14 i1="01"><s1>AI-Lab, DIST, Università di Genova</s1>
<s3>ITA</s3>
<sZ>1 aut.</sZ>
<sZ>5 aut.</sZ>
<sZ>10 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Basin, D" sort="Basin, D" uniqKey="Basin D" first="D." last="Basin">D. Basin</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Boichut, Y" sort="Boichut, Y" uniqKey="Boichut Y" first="Y." last="Boichut">Y. Boichut</name>
<affiliation><inist:fA14 i1="03"><s1>LIFC, Université de Franche-Comté</s1>
<s2>Besancon</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
<sZ>8 aut.</sZ>
<sZ>9 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Chevalier, Y" sort="Chevalier, Y" uniqKey="Chevalier Y" first="Y." last="Chevalier">Y. Chevalier</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Compagna, L" sort="Compagna, L" uniqKey="Compagna L" first="L." last="Compagna">L. Compagna</name>
<affiliation><inist:fA14 i1="01"><s1>AI-Lab, DIST, Università di Genova</s1>
<s3>ITA</s3>
<sZ>1 aut.</sZ>
<sZ>5 aut.</sZ>
<sZ>10 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cuellar, J" sort="Cuellar, J" uniqKey="Cuellar J" first="J." last="Cuellar">J. Cuellar</name>
<affiliation><inist:fA14 i1="05"><s1>Siemens AG, CT IC 3</s1>
<s2>Munich</s2>
<s3>DEU</s3>
<sZ>6 aut.</sZ>
<sZ>12 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Drielsma, P Hankes" sort="Drielsma, P Hankes" uniqKey="Drielsma P" first="P. Hankes" last="Drielsma">P. Hankes Drielsma</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Heam, P C" sort="Heam, P C" uniqKey="Heam P" first="P. C." last="Heam">P. C. Heam</name>
<affiliation><inist:fA14 i1="03"><s1>LIFC, Université de Franche-Comté</s1>
<s2>Besancon</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
<sZ>8 aut.</sZ>
<sZ>9 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kouchnarenko, O" sort="Kouchnarenko, O" uniqKey="Kouchnarenko O" first="O." last="Kouchnarenko">O. Kouchnarenko</name>
<affiliation><inist:fA14 i1="03"><s1>LIFC, Université de Franche-Comté</s1>
<s2>Besancon</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
<sZ>8 aut.</sZ>
<sZ>9 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Mantovani, J" sort="Mantovani, J" uniqKey="Mantovani J" first="J." last="Mantovani">J. Mantovani</name>
<affiliation><inist:fA14 i1="01"><s1>AI-Lab, DIST, Università di Genova</s1>
<s3>ITA</s3>
<sZ>1 aut.</sZ>
<sZ>5 aut.</sZ>
<sZ>10 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Modersheim, S" sort="Modersheim, S" uniqKey="Modersheim S" first="S." last="Mödersheim">S. Mödersheim</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Von Oheimb, D" sort="Von Oheimb, D" uniqKey="Von Oheimb D" first="D." last="Von Oheimb">D. Von Oheimb</name>
<affiliation><inist:fA14 i1="05"><s1>Siemens AG, CT IC 3</s1>
<s2>Munich</s2>
<s3>DEU</s3>
<sZ>6 aut.</sZ>
<sZ>12 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Rusinowitch, M" sort="Rusinowitch, M" uniqKey="Rusinowitch M" first="M." last="Rusinowitch">M. Rusinowitch</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Santiago, J" sort="Santiago, J" uniqKey="Santiago J" first="J." last="Santiago">J. Santiago</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Turuani, M" sort="Turuani, M" uniqKey="Turuani M" first="M." last="Turuani">M. Turuani</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Vigano, L" sort="Vigano, L" uniqKey="Vigano L" first="L." last="Vigano">L. Vigano</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Vigneron, L" sort="Vigneron, L" uniqKey="Vigneron L" first="L." last="Vigneron">L. Vigneron</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">INIST</idno>
<idno type="inist">05-0349048</idno>
<date when="2005">2005</date>
<idno type="stanalyst">PASCAL 05-0349048 INIST</idno>
<idno type="RBID">Pascal:05-0349048</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000544</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en" level="a">The AVISPA tool for the automated validation of internet security protocols and applications</title>
<author><name sortKey="Armando, A" sort="Armando, A" uniqKey="Armando A" first="A." last="Armando">A. Armando</name>
<affiliation><inist:fA14 i1="01"><s1>AI-Lab, DIST, Università di Genova</s1>
<s3>ITA</s3>
<sZ>1 aut.</sZ>
<sZ>5 aut.</sZ>
<sZ>10 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Basin, D" sort="Basin, D" uniqKey="Basin D" first="D." last="Basin">D. Basin</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Boichut, Y" sort="Boichut, Y" uniqKey="Boichut Y" first="Y." last="Boichut">Y. Boichut</name>
<affiliation><inist:fA14 i1="03"><s1>LIFC, Université de Franche-Comté</s1>
<s2>Besancon</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
<sZ>8 aut.</sZ>
<sZ>9 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Chevalier, Y" sort="Chevalier, Y" uniqKey="Chevalier Y" first="Y." last="Chevalier">Y. Chevalier</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Compagna, L" sort="Compagna, L" uniqKey="Compagna L" first="L." last="Compagna">L. Compagna</name>
<affiliation><inist:fA14 i1="01"><s1>AI-Lab, DIST, Università di Genova</s1>
<s3>ITA</s3>
<sZ>1 aut.</sZ>
<sZ>5 aut.</sZ>
<sZ>10 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Cuellar, J" sort="Cuellar, J" uniqKey="Cuellar J" first="J." last="Cuellar">J. Cuellar</name>
<affiliation><inist:fA14 i1="05"><s1>Siemens AG, CT IC 3</s1>
<s2>Munich</s2>
<s3>DEU</s3>
<sZ>6 aut.</sZ>
<sZ>12 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Drielsma, P Hankes" sort="Drielsma, P Hankes" uniqKey="Drielsma P" first="P. Hankes" last="Drielsma">P. Hankes Drielsma</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Heam, P C" sort="Heam, P C" uniqKey="Heam P" first="P. C." last="Heam">P. C. Heam</name>
<affiliation><inist:fA14 i1="03"><s1>LIFC, Université de Franche-Comté</s1>
<s2>Besancon</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
<sZ>8 aut.</sZ>
<sZ>9 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Kouchnarenko, O" sort="Kouchnarenko, O" uniqKey="Kouchnarenko O" first="O." last="Kouchnarenko">O. Kouchnarenko</name>
<affiliation><inist:fA14 i1="03"><s1>LIFC, Université de Franche-Comté</s1>
<s2>Besancon</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
<sZ>8 aut.</sZ>
<sZ>9 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Mantovani, J" sort="Mantovani, J" uniqKey="Mantovani J" first="J." last="Mantovani">J. Mantovani</name>
<affiliation><inist:fA14 i1="01"><s1>AI-Lab, DIST, Università di Genova</s1>
<s3>ITA</s3>
<sZ>1 aut.</sZ>
<sZ>5 aut.</sZ>
<sZ>10 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Modersheim, S" sort="Modersheim, S" uniqKey="Modersheim S" first="S." last="Mödersheim">S. Mödersheim</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Von Oheimb, D" sort="Von Oheimb, D" uniqKey="Von Oheimb D" first="D." last="Von Oheimb">D. Von Oheimb</name>
<affiliation><inist:fA14 i1="05"><s1>Siemens AG, CT IC 3</s1>
<s2>Munich</s2>
<s3>DEU</s3>
<sZ>6 aut.</sZ>
<sZ>12 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Rusinowitch, M" sort="Rusinowitch, M" uniqKey="Rusinowitch M" first="M." last="Rusinowitch">M. Rusinowitch</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Santiago, J" sort="Santiago, J" uniqKey="Santiago J" first="J." last="Santiago">J. Santiago</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Turuani, M" sort="Turuani, M" uniqKey="Turuani M" first="M." last="Turuani">M. Turuani</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Vigano, L" sort="Vigano, L" uniqKey="Vigano L" first="L." last="Vigano">L. Vigano</name>
<affiliation><inist:fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
<author><name sortKey="Vigneron, L" sort="Vigneron, L" uniqKey="Vigneron L" first="L." last="Vigneron">L. Vigneron</name>
<affiliation><inist:fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</inist:fA14>
</affiliation>
</author>
</analytic>
<series><title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
<imprint><date when="2005">2005</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><title level="j" type="main">Lecture notes in computer science</title>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Automatic analysis</term>
<term>Formal language</term>
<term>Internet protocol</term>
<term>Program verification</term>
<term>Robustness</term>
<term>Safety</term>
<term>Scalability</term>
<term>Transmission protocol</term>
<term>Validation</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Vérification programme</term>
<term>Protocole internet</term>
<term>Protocole transmission</term>
<term>Sécurité</term>
<term>Langage formel</term>
<term>Extensibilité</term>
<term>Validation</term>
<term>Analyse automatique</term>
<term>Robustesse</term>
</keywords>
</textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.</div>
</front>
</TEI>
<inist><standard h6="B"><pA><fA01 i1="01" i2="1"><s0>0302-9743</s0>
</fA01>
<fA05><s2>3576</s2>
</fA05>
<fA08 i1="01" i2="1" l="ENG"><s1>The AVISPA tool for the automated validation of internet security protocols and applications</s1>
</fA08>
<fA09 i1="01" i2="1" l="ENG"><s1>CAV 2005 : computer aided verification : Edinburgh, 6-10 July 2005</s1>
</fA09>
<fA11 i1="01" i2="1"><s1>ARMANDO (A.)</s1>
</fA11>
<fA11 i1="02" i2="1"><s1>BASIN (D.)</s1>
</fA11>
<fA11 i1="03" i2="1"><s1>BOICHUT (Y.)</s1>
</fA11>
<fA11 i1="04" i2="1"><s1>CHEVALIER (Y.)</s1>
</fA11>
<fA11 i1="05" i2="1"><s1>COMPAGNA (L.)</s1>
</fA11>
<fA11 i1="06" i2="1"><s1>CUELLAR (J.)</s1>
</fA11>
<fA11 i1="07" i2="1"><s1>DRIELSMA (P. Hankes)</s1>
</fA11>
<fA11 i1="08" i2="1"><s1>HEAM (P. C.)</s1>
</fA11>
<fA11 i1="09" i2="1"><s1>KOUCHNARENKO (O.)</s1>
</fA11>
<fA11 i1="10" i2="1"><s1>MANTOVANI (J.)</s1>
</fA11>
<fA11 i1="11" i2="1"><s1>MÖDERSHEIM (S.)</s1>
</fA11>
<fA11 i1="12" i2="1"><s1>VON OHEIMB (D.)</s1>
</fA11>
<fA11 i1="13" i2="1"><s1>RUSINOWITCH (M.)</s1>
</fA11>
<fA11 i1="14" i2="1"><s1>SANTIAGO (J.)</s1>
</fA11>
<fA11 i1="15" i2="1"><s1>TURUANI (M.)</s1>
</fA11>
<fA11 i1="16" i2="1"><s1>VIGANO (L.)</s1>
</fA11>
<fA11 i1="17" i2="1"><s1>VIGNERON (L.)</s1>
</fA11>
<fA12 i1="01" i2="1"><s1>ETESSAMI (Kousha)</s1>
<s9>ed.</s9>
</fA12>
<fA12 i1="02" i2="1"><s1>RAJAMANI (Sriram K.)</s1>
<s9>ed.</s9>
</fA12>
<fA14 i1="01"><s1>AI-Lab, DIST, Università di Genova</s1>
<s3>ITA</s3>
<sZ>1 aut.</sZ>
<sZ>5 aut.</sZ>
<sZ>10 aut.</sZ>
</fA14>
<fA14 i1="02"><s1>Information Security Group, ETH Zurich</s1>
<s3>CHE</s3>
<sZ>2 aut.</sZ>
<sZ>7 aut.</sZ>
<sZ>11 aut.</sZ>
<sZ>16 aut.</sZ>
</fA14>
<fA14 i1="03"><s1>LIFC, Université de Franche-Comté</s1>
<s2>Besancon</s2>
<s3>FRA</s3>
<sZ>3 aut.</sZ>
<sZ>8 aut.</sZ>
<sZ>9 aut.</sZ>
</fA14>
<fA14 i1="04"><s1>LORIA-INRIA-Lorraine</s1>
<s2>Nancy</s2>
<s3>FRA</s3>
<sZ>4 aut.</sZ>
<sZ>13 aut.</sZ>
<sZ>14 aut.</sZ>
<sZ>15 aut.</sZ>
<sZ>17 aut.</sZ>
</fA14>
<fA14 i1="05"><s1>Siemens AG, CT IC 3</s1>
<s2>Munich</s2>
<s3>DEU</s3>
<sZ>6 aut.</sZ>
<sZ>12 aut.</sZ>
</fA14>
<fA20><s1>281-285</s1>
</fA20>
<fA21><s1>2005</s1>
</fA21>
<fA23 i1="01"><s0>ENG</s0>
</fA23>
<fA26 i1="01"><s0>3-540-27231-3</s0>
</fA26>
<fA43 i1="01"><s1>INIST</s1>
<s2>16343</s2>
<s5>354000124488910260</s5>
</fA43>
<fA44><s0>0000</s0>
<s1>© 2005 INIST-CNRS. All rights reserved.</s1>
</fA44>
<fA45><s0>14 ref.</s0>
</fA45>
<fA47 i1="01" i2="1"><s0>05-0349048</s0>
</fA47>
<fA60><s1>P</s1>
<s2>C</s2>
</fA60>
<fA61><s0>A</s0>
</fA61>
<fA64 i1="01" i2="1"><s0>Lecture notes in computer science</s0>
</fA64>
<fA66 i1="01"><s0>DEU</s0>
</fA66>
<fC01 i1="01" l="ENG"><s0>AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.</s0>
</fC01>
<fC02 i1="01" i2="X"><s0>001D02B04</s0>
</fC02>
<fC02 i1="02" i2="X"><s0>001D02B09</s0>
</fC02>
<fC03 i1="01" i2="X" l="FRE"><s0>Vérification programme</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="ENG"><s0>Program verification</s0>
<s5>01</s5>
</fC03>
<fC03 i1="01" i2="X" l="SPA"><s0>Verificación programa</s0>
<s5>01</s5>
</fC03>
<fC03 i1="02" i2="X" l="FRE"><s0>Protocole internet</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="ENG"><s0>Internet protocol</s0>
<s5>06</s5>
</fC03>
<fC03 i1="02" i2="X" l="SPA"><s0>Protocolo internet</s0>
<s5>06</s5>
</fC03>
<fC03 i1="03" i2="X" l="FRE"><s0>Protocole transmission</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="ENG"><s0>Transmission protocol</s0>
<s5>07</s5>
</fC03>
<fC03 i1="03" i2="X" l="SPA"><s0>Protocolo transmisión</s0>
<s5>07</s5>
</fC03>
<fC03 i1="04" i2="X" l="FRE"><s0>Sécurité</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="ENG"><s0>Safety</s0>
<s5>08</s5>
</fC03>
<fC03 i1="04" i2="X" l="SPA"><s0>Seguridad</s0>
<s5>08</s5>
</fC03>
<fC03 i1="05" i2="X" l="FRE"><s0>Langage formel</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="ENG"><s0>Formal language</s0>
<s5>09</s5>
</fC03>
<fC03 i1="05" i2="X" l="SPA"><s0>Lenguaje formal</s0>
<s5>09</s5>
</fC03>
<fC03 i1="06" i2="X" l="FRE"><s0>Extensibilité</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="ENG"><s0>Scalability</s0>
<s5>10</s5>
</fC03>
<fC03 i1="06" i2="X" l="SPA"><s0>Estensibilidad</s0>
<s5>10</s5>
</fC03>
<fC03 i1="07" i2="X" l="FRE"><s0>Validation</s0>
<s5>23</s5>
</fC03>
<fC03 i1="07" i2="X" l="ENG"><s0>Validation</s0>
<s5>23</s5>
</fC03>
<fC03 i1="07" i2="X" l="SPA"><s0>Validación</s0>
<s5>23</s5>
</fC03>
<fC03 i1="08" i2="X" l="FRE"><s0>Analyse automatique</s0>
<s5>24</s5>
</fC03>
<fC03 i1="08" i2="X" l="ENG"><s0>Automatic analysis</s0>
<s5>24</s5>
</fC03>
<fC03 i1="08" i2="X" l="SPA"><s0>Análisis automático</s0>
<s5>24</s5>
</fC03>
<fC03 i1="09" i2="X" l="FRE"><s0>Robustesse</s0>
<s5>25</s5>
</fC03>
<fC03 i1="09" i2="X" l="ENG"><s0>Robustness</s0>
<s5>25</s5>
</fC03>
<fC03 i1="09" i2="X" l="SPA"><s0>Robustez</s0>
<s5>25</s5>
</fC03>
<fN21><s1>241</s1>
</fN21>
<fN44 i1="01"><s1>OTO</s1>
</fN44>
<fN82><s1>OTO</s1>
</fN82>
</pA>
<pR><fA30 i1="01" i2="1" l="ENG"><s1>Computer aided verification. International conference</s1>
<s2>17</s2>
<s3>Edinburgh GBR</s3>
<s4>2005-07-06</s4>
</fA30>
</pR>
</standard>
<server><NO>PASCAL 05-0349048 INIST</NO>
<ET>The AVISPA tool for the automated validation of internet security protocols and applications</ET>
<AU>ARMANDO (A.); BASIN (D.); BOICHUT (Y.); CHEVALIER (Y.); COMPAGNA (L.); CUELLAR (J.); DRIELSMA (P. Hankes); HEAM (P. C.); KOUCHNARENKO (O.); MANTOVANI (J.); MÖDERSHEIM (S.); VON OHEIMB (D.); RUSINOWITCH (M.); SANTIAGO (J.); TURUANI (M.); VIGANO (L.); VIGNERON (L.); ETESSAMI (Kousha); RAJAMANI (Sriram K.)</AU>
<AF>AI-Lab, DIST, Università di Genova/Italie (1 aut., 5 aut., 10 aut.); Information Security Group, ETH Zurich/Suisse (2 aut., 7 aut., 11 aut., 16 aut.); LIFC, Université de Franche-Comté/Besancon/France (3 aut., 8 aut., 9 aut.); LORIA-INRIA-Lorraine/Nancy/France (4 aut., 13 aut., 14 aut., 15 aut., 17 aut.); Siemens AG, CT IC 3/Munich/Allemagne (6 aut., 12 aut.)</AF>
<DT>Publication en série; Congrès; Niveau analytique</DT>
<SO>Lecture notes in computer science; ISSN 0302-9743; Allemagne; Da. 2005; Vol. 3576; Pp. 281-285; Bibl. 14 ref.</SO>
<LA>Anglais</LA>
<EA>AVISPA is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques. To the best of our knowledge, no other tool exhibits the same level of scope and robustness while enjoying the same performance and scalability.</EA>
<CC>001D02B04; 001D02B09</CC>
<FD>Vérification programme; Protocole internet; Protocole transmission; Sécurité; Langage formel; Extensibilité; Validation; Analyse automatique; Robustesse</FD>
<ED>Program verification; Internet protocol; Transmission protocol; Safety; Formal language; Scalability; Validation; Automatic analysis; Robustness</ED>
<SD>Verificación programa; Protocolo internet; Protocolo transmisión; Seguridad; Lenguaje formal; Estensibilidad; Validación; Análisis automático; Robustez</SD>
<LO>INIST-16343.354000124488910260</LO>
<ID>05-0349048</ID>
</server>
</inist>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/PascalFrancis/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000544 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/PascalFrancis/Corpus/biblio.hfd -nk 000544 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= PascalFrancis |étape= Corpus |type= RBID |clé= Pascal:05-0349048 |texte= The AVISPA tool for the automated validation of internet security protocols and applications }}
This area was generated with Dilib version V0.6.33. |