Ontology type: schema:Chapter
2001-07-04
AUTHORSDawn Song , Adrian Perrig , Doantam Phan
ABSTRACTAs new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature. More... »
PAGES241-245
Computer Aided Verification
ISBN
978-3-540-42345-4
978-3-540-44585-2
http://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21
DOIhttp://dx.doi.org/10.1007/3-540-44585-4_21
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1044514582
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computation Theory and Mathematics",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Computer Software",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "University of California, Berkeley",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"University of California, Berkeley"
],
"type": "Organization"
},
"familyName": "Song",
"givenName": "Dawn",
"id": "sg:person.01143152610.86",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01143152610.86"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of California, Berkeley",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"University of California, Berkeley"
],
"type": "Organization"
},
"familyName": "Perrig",
"givenName": "Adrian",
"id": "sg:person.015633262045.96",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015633262045.96"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of California, Berkeley",
"id": "http://www.grid.ac/institutes/grid.47840.3f",
"name": [
"University of California, Berkeley"
],
"type": "Organization"
},
"familyName": "Phan",
"givenName": "Doantam",
"id": "sg:person.010347643517.65",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010347643517.65"
],
"type": "Person"
}
],
"datePublished": "2001-07-04",
"datePublishedReg": "2001-07-04",
"description": "As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature.",
"editor": [
{
"familyName": "Berry",
"givenName": "G\u00e9rard",
"type": "Person"
},
{
"familyName": "Comon",
"givenName": "Hubert",
"type": "Person"
},
{
"familyName": "Finkel",
"givenName": "Alain",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/3-540-44585-4_21",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-540-42345-4",
"978-3-540-44585-2"
],
"name": "Computer Aided Verification",
"type": "Book"
},
"keywords": [
"security protocols",
"new security protocol",
"new Internet applications",
"security requirements",
"Internet applications",
"automatic generation",
"current protocol design",
"protocol designers",
"error prone",
"system specification",
"protocol design",
"specific applications",
"verification",
"implementation process",
"implementation",
"protocol",
"Java",
"correctness",
"applications",
"prone",
"designers",
"specification",
"requirements",
"simple protocol",
"generation",
"system",
"design",
"optimal protocol",
"experiments",
"one",
"process",
"literature",
"problem"
],
"name": "AGVI \u2014 Automatic Generation, Verification, and Implementation of Security Protocols",
"pagination": "241-245",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1044514582"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/3-540-44585-4_21"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/3-540-44585-4_21",
"https://app.dimensions.ai/details/publication/pub.1044514582"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-10T10:56",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220509/entities/gbq_results/chapter/chapter_79.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/3-540-44585-4_21"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/3-540-44585-4_21'
This table displays all metadata directly associated to this object as RDF triples.
121 TRIPLES
23 PREDICATES
59 URIs
51 LITERALS
7 BLANK NODES