A Unified Architecture for the Implementation of Security Protocols

نویسندگان

  • Ibrahim S. Abdullah
  • Daniel A. Menascé
چکیده

Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a unified architecture for the implementation of security protocols in the form of a security toolbox system. Our design, based on the concepts of Component Based Software Engineering (CBSE), provides fast and flexible implementation and deployment of security protocols.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

از پیاده سازی معماری سرویس گرا تا چابکی سازمان با رویکرد مدلسازی پویایی سیستم

SOA is type of architecture that used service to simplify integration activities and use the components for reusable. Companies to survive in the dynamic environment needed to strengthen their organizations through information systems and service-oriented architecture is a way for the integration and effectiveness of the use of information systems and achieve organizational agility. In this pap...

متن کامل

A Multiple Adaptive Neuro-Fuzzy Inference System for Predicting ERP Implementation Success

The implementation of modern ERP solutions has introduced tremendous opportunities as well as challenges into the realm of intensely competent businesses. The ERP implementation phase is a very costly and time-consuming process. The failure of the implementation may result in the entire business to fail or to become incompetent. This fact along with the complexity of data streams has led ...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

The Effectiveness of Unified Trans Diagnostic Treatment Protocols on Parent-Child Interaction and Blood Sugar Levels in Adolescents with Type 1 Diabetes

Objective: The parent-child relationship and the daily blood sugar control by adolescents can affect family functioning. This study aimed to evaluate the effectiveness of unified trans-diagnostic treatment protocols on parent-child interaction and blood sugar levels in adolescents with type 1 diabetes. Materials and Methods: The present study was quasi-experimental with a pretest and posttest ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003