Protocol Implementation Generator

Jose Nuno Carvalho Quaresma, Christian W. Probst

    Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

    Abstract

    Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation Generator framework based on the LySatool and a translator from the LySa language into C or Java.
    Original languageEnglish
    Title of host publicationProceedings of The 15th Nordic Conference on Secure IT Systems
    Publication date2010
    Publication statusPublished - 2010
    EventThe 15th Nordic Conference on Secure IT Systems - Espoo, Finland
    Duration: 27 Oct 201029 Oct 2010

    Conference

    ConferenceThe 15th Nordic Conference on Secure IT Systems
    CountryFinland
    CityEspoo
    Period27/10/201029/10/2010

    Fingerprint

    Dive into the research topics of 'Protocol Implementation Generator'. Together they form a unique fingerprint.

    Cite this