|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-0-387-23228-7 |
003 |
DE-He213 |
005 |
20220117034531.0 |
007 |
cr nn 008mamaa |
008 |
100301s2005 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780387232287
|9 978-0-387-23228-7
|
024 |
7 |
|
|a 10.1007/b101038
|2 doi
|
050 |
|
4 |
|a TK5105.5-5105.9
|
072 |
|
7 |
|a UKN
|2 bicssc
|
072 |
|
7 |
|a COM075000
|2 bisacsh
|
072 |
|
7 |
|a UKN
|2 thema
|
082 |
0 |
4 |
|a 004.6
|2 23
|
100 |
1 |
|
|a McGuire, Tommy M.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
4 |
|a The Austin Protocol Compiler
|h [electronic resource] /
|c by Tommy M. McGuire, Mohamed G. Gouda.
|
250 |
|
|
|a 1st ed. 2005.
|
264 |
|
1 |
|a New York, NY :
|b Springer US :
|b Imprint: Springer,
|c 2005.
|
300 |
|
|
|a XIII, 141 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advances in Information Security,
|x 2512-2193 ;
|v 13
|
505 |
0 |
|
|a Network Protocols -- The Timed Abstract Protocol Notation -- Execution Models of Network Protocols -- Equivalence of Execution Models -- Preserving Fairness -- The Austin Protocol Compiler -- Two Examples -- A DNS Server -- Concluding Remarks.
|
520 |
|
|
|a -The Austin Protocol Compiler presents a protocol specification language called the Timed Abstract Protocol (TAP) notation. This book will finally close the communication gap between the protocol verifiers and the protocol implementers. The TAP notation uses two types of semantics: an abstract semantics that appeals to the protocol verifiers and a concrete semantics which appeals to the protocol implementers. The Austin Protocol Compiler illustrates that the two types of semantics of TAP are equivalent. Thus, the correctness of TAP specification of some protocol, that is established based on the abstract semantics of TAP, is maintained when this specification is implemented based on concrete semantics of TAP. The equivalence between the abstract and concrete semantics of TAP suggests the following three-step method for developing a correct implementation of a protocol in this book: 1. Specify the protocol using the TAP notation. 2. Verify the correctness of the specification based on the abstract semantics of TAP 3. Implement the specification based on the concrete semantics of TAP For step 3, this book introduces the Austin Protocol Compiler (APC) that takes as input, a TAP specification of some protocol, and produces as output C-code that implements this protocol based on the concrete semantics of TAP. The Austin Protocol Compiler is designed for a professional audience composed of protocol designers, verifiers, reviewers and implementers. This volume is also suitable for graduate-level students in computer science and electrical engineering.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Computer input-output equipment.
|
650 |
|
0 |
|a Computer engineering.
|
650 |
1 |
4 |
|a Computer Communication Networks.
|
650 |
2 |
4 |
|a Computer and Information Systems Applications.
|
650 |
2 |
4 |
|a Data Structures and Information Theory.
|
650 |
2 |
4 |
|a Input/Output and Data Communications.
|
650 |
2 |
4 |
|a Computer Engineering and Networks.
|
700 |
1 |
|
|a Gouda, Mohamed G.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781441935885
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387502663
|
776 |
0 |
8 |
|i Printed edition:
|z 9780387232270
|
830 |
|
0 |
|a Advances in Information Security,
|x 2512-2193 ;
|v 13
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/b101038
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|