Back to Results
First PageMeta Content
Data modeling / Computing / Diagrams / Automata theory / Digital electronics / Unified Modeling Language / Communications protocol / Finite-state machine / Activity diagram / Models of computation / UML diagrams / Software engineering


NRL Release Number[removed]Visual Security Protocol Modeling J. McDermott Center for High Assurance Computer Systems
Add to Reading List

Document Date: 2013-04-26 12:50:29


Open Document

File Size: 414,47 KB

Share Result on Facebook

City

Petrinet / Washington / DC / /

Company

Naval Research Laboratory / Communicating Systems / Object Management Group / High Assurance Computer Systems Naval Research Laboratory / /

Country

United States / /

Currency

pence / /

/

Facility

port of Figure / Naval Research Laboratory / /

IndustryTerm

software construction / information flow security protocol / visual security protocol / security protocol / model security protocols / allowable protocol / requirements tools / event systems / implemented protocol / software developers / labeled transition systems / non-cryptographic security protocol / suitable information flow security protocol / transition systems / allowable security protocol / software development / multidimensional protocol / service protocol / session key establishment protocol / clever solution / cryptographic protocols / security protocol analysis tool / automatic processing / security-protocol-specific tools / basic labeled transition systems / software quality / control applications / cryptographic security protocol / particular protocol / protocol analysis tool / information flow security protocols / cryptographic protocol / security protocols / cryptographic protocol analysis tools / cryptographic security protocols / /

Organization

Navy / United Nations / Visual Security Protocol Modeling J. McDermott Center for High Assurance Computer Systems Naval Research Laboratory Washington / /

Person

B. Figure / Carl Petri / /

Position

multilevel boundary controller / model for that property / outside observer / General / Server Process Server / model of Figure / shared events model / left end / /

ProgrammingLanguage

DC / /

Technology

object-oriented programming / information flow security protocols / information flow security protocol / suitable information flow security protocol / modeling security protocols / model security protocols / cryptographic protocol / properly implemented protocol / Yahahlom cryptographic security protocol / ahigh Protocol bhigh Protocol alow Protocol blow Protocol Protocol / security protocols / process box Protocol / blow Protocol Protocol ahigh Protocol bhigh Protocol alow Protocol / 4.1 UML Candidates To model security protocols / 2110 Visual Security Protocol / alow Protocol blow Protocol Protocol ahigh Protocol bhigh Protocol / cryptographic security protocols / 4.3 Security Protocol / allowable protocol / non-cryptographic security protocol / Protocol ahigh Protocol bhigh Protocol alow Protocol / cryptography / security protocol / visual security protocol / existing security protocol / Yahalom protocol / cryptographic security protocol / particular protocol / visually model security protocols / bhigh Protocol alow Protocol blow Protocol Protocol ahigh Protocol / good protocol / session key establishment protocol / service protocol / allowable security protocol / ahigh Protocol bhigh Protocol alow Protocol blow Protocol / Languages Keywords security protocol / /

SocialTag