Formally based semi-automatic implementation of an open security protocol
نویسندگان
چکیده
منابع مشابه
Formally based semi-automatic implementation of an open security protocol
This paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm that leverages formal methods in order to obtain high correctness assurance. The approach used in the experiment starts with the formalization of the protocol at an abstract level. This model...
متن کاملDesign and implementation of an automatic car turning system
In this paper, a control system is designed for automatic car turning. At first, the necessary information of car turning that were collected from the traffic bylaw, car driving training centers and traffic police are explained. Then, car turning is studied experimentally on several streets with different widths. Afterward, a proper path is designed for the automatic car turning system consider...
متن کاملdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولImplementing a Formally Verifiable Security Protocol in Java Card
This paper describes a case study in refining an abstract security protocol description down to a concrete implementation on a Java Card smart card. The aim is to consider the decisions that have to be made in the development of such an implementation in a systematic way, and to investigate the possibilities of formal specification and verification in the design process and for the final implem...
متن کاملFormally Verified, Tag-Based Security Monitors
Recent advances in hardware design have demonstrated mechanisms allowing a wide range of low-level security policies (or micro-policies) to be expressed using rules on metadata tags. We propose a methodology for defining and reasoning about such tag-based reference monitors in terms of a high-level “symbolic machine,” and we use this methodology to define and formally verify micro-policies for ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Systems and Software
سال: 2012
ISSN: 0164-1212
DOI: 10.1016/j.jss.2011.10.052