The Austin Protocol Compiler The Austin Protocol Compiler
Advances in Information Security

The Austin Protocol Compiler

    • € 109,99
    • € 109,99

Beschrijving uitgever

-The Austin Protocol Compiler presents a protocol specification language called the Timed Abstract Protocol (TAP) notation. This book will finally close the communication gap between the protocol verifiers and the protocol implementers.


The TAP notation uses two types of semantics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics which appeals to the protocol implementers. The Austin Protocol Compiler illustrates that the two types of semantics of TAP are equivalent. Thus, the correctness of TAP specification of some protocol, that is established based on the abstract semantics of TAP, is maintained when this specification is implemented based on concrete semantics of TAP. The equivalence between the abstract and concrete semantics of TAP suggests the following three-step method for developing a correct implementation of a protocol in this book:

1. Specify the protocol using the TAP notation.

2. Verify the correctness of the specification based on the abstract semantics of TAP

3. Implement the specification based on the concrete semantics of TAP


For step 3, this book introduces the Austin Protocol Compiler (APC) that takes as input, a TAP specification of some protocol, and produces as output C-code that implements this protocol based on the concrete semantics of TAP.


The Austin Protocol Compiler is designed for a professional audience composed of protocol designers, verifiers, reviewers and implementers. This volume is also suitable for graduate-level students in computer science and electrical engineering.

GENRE
Computers en internet
UITGEGEVEN
2006
20 januari
TAAL
EN
Engels
LENGTE
154
Pagina's
UITGEVER
Springer US
PROVIDER INFO
Springer Science & Business Media LLC
GROOTTE
993,8
kB
Security in E-Learning Security in E-Learning
2006
Impacts and Risk Assessment of Technology for Internet Security Impacts and Risk Assessment of Technology for Internet Security
2006
Hop Integrity in the Internet Hop Integrity in the Internet
2006
Understanding Intrusion Detection through Visualization Understanding Intrusion Detection through Visualization
2006
CryptoGraphics CryptoGraphics
2006
Computer Viruses and Malware Computer Viruses and Malware
2006