书目名称 | The Austin Protocol Compiler | 编辑 | Tommy M. McGuire,Mohamed G. Gouda | 视频video | | 概述 | Presents alternative ways of developing a network protocol discussing security protocols, implementing security protocols, abstract protocols and protocol correctness.Includes supplementary material: | 丛书名称 | Advances in Information Security | 图书封面 |  | 描述 | There are two groups of researchers who are interested in designing network protocols and who cannot (yet) effectively communicate with one another c- cerning these protocols. The first is the group of protocol verifiers, and the second is the group of protocol implementors. The main reason for the lack of effective communication between these two groups is that these groups use languages with quite different semantics to specify network protocols. On one hand, the protocol verifiers use specification languages whose semantics are abstract, coarse-grained, and with large atom- ity. Clearly, protocol specifications that are developed based on such semantics are easier to prove correct. On the other hand, the protocol implementors use specification languages whose semantics are concrete, fine-grained, and with small atomicity. Protocol specifications that are developed based on such - mantics are easier to implement using system programming languages such as C, C++, and Java. To help in closing this communication gap between the group of protocol verifiers and the group of protocol implementors, we present in this monograph a protocol specification language called the Timed Abstract | 出版日期 | Book 2005 | 关键词 | DEX; DNS; Equivalence; boundary element method; compiler; implementation; network; network protocol; semanti | 版次 | 1 | doi | https://doi.org/10.1007/b101038 | isbn_softcover | 978-1-4419-3588-5 | isbn_ebook | 978-0-387-23228-7Series ISSN 1568-2633 Series E-ISSN 2512-2193 | issn_series | 1568-2633 | copyright | Springer-Verlag US 2005 |
The information of publication is updating
|
|