The Austin Protocol Compiler

-The Austin Protocol Compiler presents a protocol specification language called the Timed Abstract Protocol (TAP) notation. This book will finally close the communication gap between the protocol verifiers and the protocol implementers. The TAP notation uses two types of semantics: an abstract seman...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριοι συγγραφείς: McGuire, Tommy M. (Συγγραφέας), Gouda, Mohamed G. (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Boston, MA : Springer US, 2005.
Σειρά:Advances in Information Security, 13
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03788nam a22005535i 4500
001 978-0-387-23228-7
003 DE-He213
005 20151204142427.0
007 cr nn 008mamaa
008 100301s2005 xxu| s |||| 0|eng d
020 |a 9780387232287  |9 978-0-387-23228-7 
024 7 |a 10.1007/b101038  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
100 1 |a McGuire, Tommy M.  |e author. 
245 1 4 |a The Austin Protocol Compiler  |h [electronic resource] /  |c by Tommy M. McGuire, Mohamed G. Gouda. 
264 1 |a Boston, MA :  |b Springer US,  |c 2005. 
300 |a XIII, 141 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 1568-2633 ;  |v 13 
505 0 |a Network Protocols -- The Timed Abstract Protocol Notation -- Execution Models of Network Protocols -- Equivalence of Execution Models -- Preserving Fairness -- The Austin Protocol Compiler -- Two Examples -- A DNS Server -- Concluding Remarks. 
520 |a -The Austin Protocol Compiler presents a protocol specification language called the Timed Abstract Protocol (TAP) notation. This book will finally close the communication gap between the protocol verifiers and the protocol implementers. The TAP notation uses two types of semantics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics which appeals to the protocol implementers. The Austin Protocol Compiler illustrates that the two types of semantics of TAP are equivalent. Thus, the correctness of TAP specification of some protocol, that is established based on the abstract semantics of TAP, is maintained when this specification is implemented based on concrete semantics of TAP. The equivalence between the abstract and concrete semantics of TAP suggests the following three-step method for developing a correct implementation of a protocol in this book: 1. Specify the protocol using the TAP notation. 2. Verify the correctness of the specification based on the abstract semantics of TAP 3. Implement the specification based on the concrete semantics of TAP For step 3, this book introduces the Austin Protocol Compiler (APC) that takes as input, a TAP specification of some protocol, and produces as output C-code that implements this protocol based on the concrete semantics of TAP. The Austin Protocol Compiler is designed for a professional audience composed of protocol designers, verifiers, reviewers and implementers. This volume is also suitable for graduate-level students in computer science and electrical engineering. 
650 0 |a Computer science. 
650 0 |a Input-output equipment (Computers). 
650 0 |a Computer organization. 
650 0 |a Computer communication systems. 
650 0 |a Data structures (Computer science). 
650 0 |a Computers. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Information Systems and Communication Service. 
650 2 4 |a Information Systems Applications (incl. Internet). 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Input/Output and Data Communications. 
650 2 4 |a Computer Systems Organization and Communication Networks. 
700 1 |a Gouda, Mohamed G.  |e author. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9780387232270 
830 0 |a Advances in Information Security,  |x 1568-2633 ;  |v 13 
856 4 0 |u http://dx.doi.org/10.1007/b101038  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)