Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.
Bo MengChin-Tser HuangYitong YangLeyuan NiuDejun WangPublished in: Int. J. Netw. Secur. (2017)
Keyphrases
- computational model
- security protocols
- high level
- java code
- artificial immune algorithm
- computational framework
- security services
- cognitive architecture
- computational models
- cryptographic algorithms
- source code
- programming language
- controlled natural language
- security mechanisms
- object oriented
- formal descriptions
- open source
- authentication protocol
- key management
- language acquisition
- rfid systems
- cognitive modeling
- security requirements
- computational modeling
- artificial intelligence
- low cost
- response time
- digital libraries
- web services