AGVI — Automatic Generation, Verification, and Implementation of Security Protocols View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2001-07-04

AUTHORS

Dawn Song , Adrian Perrig , Doantam Phan

ABSTRACT

As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature. More... »

PAGES

241-245

Book

TITLE

Computer Aided Verification

ISBN

978-3-540-42345-4
978-3-540-44585-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21

DOI

http://dx.doi.org/10.1007/3-540-44585-4_21

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1044514582


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "University of California, Berkeley", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California, Berkeley"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Song", 
        "givenName": "Dawn", 
        "id": "sg:person.01143152610.86", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California, Berkeley", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California, Berkeley"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Perrig", 
        "givenName": "Adrian", 
        "id": "sg:person.015633262045.96", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015633262045.96"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of California, Berkeley", 
          "id": "http://www.grid.ac/institutes/grid.47840.3f", 
          "name": [
            "University of California, Berkeley"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Phan", 
        "givenName": "Doantam", 
        "id": "sg:person.010347643517.65", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010347643517.65"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2001-07-04", 
    "datePublishedReg": "2001-07-04", 
    "description": "As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature.", 
    "editor": [
      {
        "familyName": "Berry", 
        "givenName": "G\u00e9rard", 
        "type": "Person"
      }, 
      {
        "familyName": "Comon", 
        "givenName": "Hubert", 
        "type": "Person"
      }, 
      {
        "familyName": "Finkel", 
        "givenName": "Alain", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/3-540-44585-4_21", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-42345-4", 
        "978-3-540-44585-2"
      ], 
      "name": "Computer Aided Verification", 
      "type": "Book"
    }, 
    "keywords": [
      "security protocols", 
      "new security protocol", 
      "new Internet applications", 
      "security requirements", 
      "Internet applications", 
      "automatic generation", 
      "current protocol design", 
      "protocol designers", 
      "error prone", 
      "system specification", 
      "protocol design", 
      "specific applications", 
      "verification", 
      "implementation process", 
      "implementation", 
      "protocol", 
      "Java", 
      "correctness", 
      "applications", 
      "prone", 
      "designers", 
      "specification", 
      "requirements", 
      "simple protocol", 
      "generation", 
      "system", 
      "design", 
      "optimal protocol", 
      "experiments", 
      "one", 
      "process", 
      "literature", 
      "problem"
    ], 
    "name": "AGVI \u2014 Automatic Generation, Verification, and Implementation of Security Protocols", 
    "pagination": "241-245", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1044514582"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/3-540-44585-4_21"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/3-540-44585-4_21", 
      "https://app.dimensions.ai/details/publication/pub.1044514582"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-10T10:56", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_79.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/3-540-44585-4_21"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'


 

This table displays all metadata directly associated to this object as RDF triples.

121 TRIPLES      23 PREDICATES      59 URIs      51 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/3-540-44585-4_21 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 anzsrc-for:0803
4 schema:author N0f0413251bc6485e87cc0702e1152470
5 schema:datePublished 2001-07-04
6 schema:datePublishedReg 2001-07-04
7 schema:description As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature.
8 schema:editor Nb8293679f7ef4e5f9d1b8b02029d5cf0
9 schema:genre chapter
10 schema:inLanguage en
11 schema:isAccessibleForFree false
12 schema:isPartOf Nf00aae70c24747bf9c181f878a3a3cf3
13 schema:keywords Internet applications
14 Java
15 applications
16 automatic generation
17 correctness
18 current protocol design
19 design
20 designers
21 error prone
22 experiments
23 generation
24 implementation
25 implementation process
26 literature
27 new Internet applications
28 new security protocol
29 one
30 optimal protocol
31 problem
32 process
33 prone
34 protocol
35 protocol design
36 protocol designers
37 requirements
38 security protocols
39 security requirements
40 simple protocol
41 specific applications
42 specification
43 system
44 system specification
45 verification
46 schema:name AGVI — Automatic Generation, Verification, and Implementation of Security Protocols
47 schema:pagination 241-245
48 schema:productId N36a2d93dd05a45518e93a5efd51a509c
49 Ne2629aa3eb914662ab99bd5e64069472
50 schema:publisher Nac3c7f4333c74ec5b7f0a4da0083339f
51 schema:sameAs https://app.dimensions.ai/details/publication/pub.1044514582
52 https://doi.org/10.1007/3-540-44585-4_21
53 schema:sdDatePublished 2022-05-10T10:56
54 schema:sdLicense https://scigraph.springernature.com/explorer/license/
55 schema:sdPublisher Nbce0f9f7ebcc4f2899b298d757fd37b4
56 schema:url https://doi.org/10.1007/3-540-44585-4_21
57 sgo:license sg:explorer/license/
58 sgo:sdDataset chapters
59 rdf:type schema:Chapter
60 N032bf6ce833d4066a9dc448dc55ba844 rdf:first Nbdad05daa7ab454499907516b4bc41cb
61 rdf:rest rdf:nil
62 N0f0413251bc6485e87cc0702e1152470 rdf:first sg:person.01143152610.86
63 rdf:rest Nd07d1b1b997749769ad4959d3023ef3b
64 N36a2d93dd05a45518e93a5efd51a509c schema:name dimensions_id
65 schema:value pub.1044514582
66 rdf:type schema:PropertyValue
67 N3f532593b96947e19efcf215f277f20b rdf:first sg:person.010347643517.65
68 rdf:rest rdf:nil
69 N6fb921de819c4c43a71c8d4fb46ab58c schema:familyName Berry
70 schema:givenName Gérard
71 rdf:type schema:Person
72 Na83e01b61e864018bcc3d0a598914b4f schema:familyName Comon
73 schema:givenName Hubert
74 rdf:type schema:Person
75 Nac3c7f4333c74ec5b7f0a4da0083339f schema:name Springer Nature
76 rdf:type schema:Organisation
77 Nacad620e887948b3895b674b7cc16f93 rdf:first Na83e01b61e864018bcc3d0a598914b4f
78 rdf:rest N032bf6ce833d4066a9dc448dc55ba844
79 Nb8293679f7ef4e5f9d1b8b02029d5cf0 rdf:first N6fb921de819c4c43a71c8d4fb46ab58c
80 rdf:rest Nacad620e887948b3895b674b7cc16f93
81 Nbce0f9f7ebcc4f2899b298d757fd37b4 schema:name Springer Nature - SN SciGraph project
82 rdf:type schema:Organization
83 Nbdad05daa7ab454499907516b4bc41cb schema:familyName Finkel
84 schema:givenName Alain
85 rdf:type schema:Person
86 Nd07d1b1b997749769ad4959d3023ef3b rdf:first sg:person.015633262045.96
87 rdf:rest N3f532593b96947e19efcf215f277f20b
88 Ne2629aa3eb914662ab99bd5e64069472 schema:name doi
89 schema:value 10.1007/3-540-44585-4_21
90 rdf:type schema:PropertyValue
91 Nf00aae70c24747bf9c181f878a3a3cf3 schema:isbn 978-3-540-42345-4
92 978-3-540-44585-2
93 schema:name Computer Aided Verification
94 rdf:type schema:Book
95 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
96 schema:name Information and Computing Sciences
97 rdf:type schema:DefinedTerm
98 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
99 schema:name Computation Theory and Mathematics
100 rdf:type schema:DefinedTerm
101 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
102 schema:name Computer Software
103 rdf:type schema:DefinedTerm
104 sg:person.010347643517.65 schema:affiliation grid-institutes:grid.47840.3f
105 schema:familyName Phan
106 schema:givenName Doantam
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010347643517.65
108 rdf:type schema:Person
109 sg:person.01143152610.86 schema:affiliation grid-institutes:grid.47840.3f
110 schema:familyName Song
111 schema:givenName Dawn
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86
113 rdf:type schema:Person
114 sg:person.015633262045.96 schema:affiliation grid-institutes:grid.47840.3f
115 schema:familyName Perrig
116 schema:givenName Adrian
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015633262045.96
118 rdf:type schema:Person
119 grid-institutes:grid.47840.3f schema:alternateName University of California, Berkeley
120 schema:name University of California, Berkeley
121 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...