The Austin Protocol Compiler The Austin Protocol Compiler
Advances in Information Security

The Austin Protocol Compiler

    • 109,99 €
    • 109,99 €

Descrição da editora

-The Austin Protocol Compiler presents a protocol specification language called the Timed Abstract Protocol (TAP) notation. This book will finally close the communication gap between the protocol verifiers and the protocol implementers.


The TAP notation uses two types of semantics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics which appeals to the protocol implementers. The Austin Protocol Compiler illustrates that the two types of semantics of TAP are equivalent. Thus, the correctness of TAP specification of some protocol, that is established based on the abstract semantics of TAP, is maintained when this specification is implemented based on concrete semantics of TAP. The equivalence between the abstract and concrete semantics of TAP suggests the following three-step method for developing a correct implementation of a protocol in this book:

1. Specify the protocol using the TAP notation.

2. Verify the correctness of the specification based on the abstract semantics of TAP

3. Implement the specification based on the concrete semantics of TAP


For step 3, this book introduces the Austin Protocol Compiler (APC) that takes as input, a TAP specification of some protocol, and produces as output C-code that implements this protocol based on the concrete semantics of TAP.


The Austin Protocol Compiler is designed for a professional audience composed of protocol designers, verifiers, reviewers and implementers. This volume is also suitable for graduate-level students in computer science and electrical engineering.

GÉNERO
Computadores e Internet
LANÇADO
2006
20 de janeiro
IDIOMA
EN
Inglês
PÁGINAS
154
EDITORA
Springer US
INFORMAÇÕES DO FORNECEDOR
Springer Science & Business Media LLC
TAMANHO
993,8
KB
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023