Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation Generator framework based on the LySatool and a translator from the LySa language into C or Java.
|Title of host publication||Proceedings of The 15th Nordic Conference on Secure IT Systems|
|Publication status||Published - 2010|
|Event||The 15th Nordic Conference on Secure IT Systems - Espoo, Finland|
Duration: 27 Oct 2010 → 29 Oct 2010
|Conference||The 15th Nordic Conference on Secure IT Systems|
|Period||27/10/2010 → 29/10/2010|