A Model Based Security Testing Method for Protocol Implementation

Joint Authors

Fu, Yu Long
Xin, Xiao Long

Source

The Scientific World Journal

Issue

Vol. 2014, Issue 2014 (31 Dec. 2014), pp.1-10, 10 p.

Publisher

Hindawi Publishing Corporation

Publication Date

2014-07-03

Country of Publication

Egypt

No. of Pages

10

Main Subjects

Medicine
Information Technology and Computer Science

Abstract EN

The security of protocol implementation is important and hard to be verified.

Since the penetration testing is usually based on the experience of the security tester and the specific protocol specifications, a formal and automatic verification method is always required.

In this paper, we propose an extended model of IOLTS to describe the legal roles and intruders of security protocol implementations, and then combine them together to generate the suitable test cases to verify the security of protocol implementation.

American Psychological Association (APA)

Fu, Yu Long& Xin, Xiao Long. 2014. A Model Based Security Testing Method for Protocol Implementation. The Scientific World Journal،Vol. 2014, no. 2014, pp.1-10.
https://search.emarefa.net/detail/BIM-1050430

Modern Language Association (MLA)

Fu, Yu Long& Xin, Xiao Long. A Model Based Security Testing Method for Protocol Implementation. The Scientific World Journal No. 2014 (2014), pp.1-10.
https://search.emarefa.net/detail/BIM-1050430

American Medical Association (AMA)

Fu, Yu Long& Xin, Xiao Long. A Model Based Security Testing Method for Protocol Implementation. The Scientific World Journal. 2014. Vol. 2014, no. 2014, pp.1-10.
https://search.emarefa.net/detail/BIM-1050430

Data Type

Journal Articles

Language

English

Notes

Includes bibliographical references

Record ID

BIM-1050430