A Unified Architecture for the Implementation of Security Protocols
نویسندگان
چکیده
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a unified architecture for the implementation of security protocols in the form of a security toolbox system. Our design, based on the concepts of Component Based Software Engineering (CBSE), provides fast and flexible implementation and deployment of security protocols.
منابع مشابه
از پیاده سازی معماری سرویس گرا تا چابکی سازمان با رویکرد مدلسازی پویایی سیستم
SOA is type of architecture that used service to simplify integration activities and use the components for reusable. Companies to survive in the dynamic environment needed to strengthen their organizations through information systems and service-oriented architecture is a way for the integration and effectiveness of the use of information systems and achieve organizational agility. In this pap...
متن کاملA Multiple Adaptive Neuro-Fuzzy Inference System for Predicting ERP Implementation Success
The implementation of modern ERP solutions has introduced tremendous opportunities as well as challenges into the realm of intensely competent businesses. The ERP implementation phase is a very costly and time-consuming process. The failure of the implementation may result in the entire business to fail or to become incompetent. This fact along with the complexity of data streams has led ...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملThe Effectiveness of Unified Trans Diagnostic Treatment Protocols on Parent-Child Interaction and Blood Sugar Levels in Adolescents with Type 1 Diabetes
Objective: The parent-child relationship and the daily blood sugar control by adolescents can affect family functioning. This study aimed to evaluate the effectiveness of unified trans-diagnostic treatment protocols on parent-child interaction and blood sugar levels in adolescents with type 1 diabetes. Materials and Methods: The present study was quasi-experimental with a pretest and posttest ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003