|
|
|
|
LEADER |
03788nam a22005535i 4500 |
001 |
978-0-387-23228-7 |
003 |
DE-He213 |
005 |
20151204142427.0 |
007 |
cr nn 008mamaa |
008 |
100301s2005 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387232287
|9 978-0-387-23228-7
|
024 |
7 |
|
|a 10.1007/b101038
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a McGuire, Tommy M.
|e author.
|
245 |
1 |
4 |
|a The Austin Protocol Compiler
|h [electronic resource] /
|c by Tommy M. McGuire, Mohamed G. Gouda.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 2005.
|
300 |
|
|
|a XIII, 141 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 1568-2633 ;
|v 13
|
505 |
0 |
|
|a Network Protocols -- The Timed Abstract Protocol Notation -- Execution Models of Network Protocols -- Equivalence of Execution Models -- Preserving Fairness -- The Austin Protocol Compiler -- Two Examples -- A DNS Server -- Concluding Remarks.
|
520 |
|
|
|a -The Austin Protocol Compiler presents a protocol specification language called the Timed Abstract Protocol (TAP) notation. This book will finally close the communication gap between the protocol verifiers and the protocol implementers. The TAP notation uses two types of semantics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics which appeals to the protocol implementers. The Austin Protocol Compiler illustrates that the two types of semantics of TAP are equivalent. Thus, the correctness of TAP specification of some protocol, that is established based on the abstract semantics of TAP, is maintained when this specification is implemented based on concrete semantics of TAP. The equivalence between the abstract and concrete semantics of TAP suggests the following three-step method for developing a correct implementation of a protocol in this book: 1. Specify the protocol using the TAP notation. 2. Verify the correctness of the specification based on the abstract semantics of TAP 3. Implement the specification based on the concrete semantics of TAP For step 3, this book introduces the Austin Protocol Compiler (APC) that takes as input, a TAP specification of some protocol, and produces as output C-code that implements this protocol based on the concrete semantics of TAP. The Austin Protocol Compiler is designed for a professional audience composed of protocol designers, verifiers, reviewers and implementers. This volume is also suitable for graduate-level students in computer science and electrical engineering.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Input-output equipment (Computers).
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Computer communication systems.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Computers.
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Input/Output and Data Communications.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
700 |
1 |
|
|a Gouda, Mohamed G.
|e author.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387232270
|
830 |
|
0 |
|a Advances in Information Security,
|x 1568-2633 ;
|v 13
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b101038
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
950 |
|
|
|a Computer Science (Springer-11645)
|