Detail publikace

An Approach to Automated Design of Security Protocols

Originální název

An Approach to Automated Design of Security Protocols

Anglický název

An Approach to Automated Design of Security Protocols

Jazyk

en

Originální abstrakt

This paper deals with a formal specification approach that supports the design of security protocols. After introduction to communication protocols and description of the current problems in the design process, the subsequent section of the paper reviews a framework that is based on the genetic-programming approach. The original contribution consists of presentation of automated system to demonstrate the utilization of this approach for designing protocols that can establish secure communication. Moreover, this paper compares analytical and automated technique that might be used in the design process.

Anglický abstrakt

This paper deals with a formal specification approach that supports the design of security protocols. After introduction to communication protocols and description of the current problems in the design process, the subsequent section of the paper reviews a framework that is based on the genetic-programming approach. The original contribution consists of presentation of automated system to demonstrate the utilization of this approach for designing protocols that can establish secure communication. Moreover, this paper compares analytical and automated technique that might be used in the design process.

BibTex


@inproceedings{BUT22200,
  author="Pavel {Očenášek} and Miroslav {Švéda}",
  title="An Approach to Automated Design of Security Protocols",
  annote="This paper deals with a formal specification approach that supports the design of
security protocols. After introduction to communication protocols and description
of the current problems in the design process, the subsequent section of the
paper reviews a framework that is based on the genetic-programming approach. The
original contribution consists of presentation of automated system to demonstrate
the utilization of this approach for designing protocols that can establish
secure communication. Moreover, this paper compares analytical and automated
technique that might be used in the design process.",
  address="IEEE Computer Society",
  booktitle="Proceedings of the International Conference on Networking (ICN 2006)",
  chapter="22200",
  institution="IEEE Computer Society",
  year="2006",
  month="april",
  pages="192--0",
  publisher="IEEE Computer Society",
  type="conference paper"
}