期刊文献+

作战系统网络通信协议描述与验证方法及实现 被引量:1

Description and Verification Method and Implementation of Network Communication Protocol in Combat System
下载PDF
导出
摘要 基于可扩展标记语言结构化、通用化等特点,文章在分析作战系统网络通信协议基本组成及描述、验证需求的基础上,开发了一种通用化的网络通信协议编辑软件,采用图形化人机界面的方式,方便用户快速进行作战系统网络通信协议的制定、编辑和描述,并通过XSD文件进行协议描述文件的格式校验,软件支持将描述的协议内容按照预定模板,自动生成通信协议文件,方便系统设计人员进行通信协议文件的编制和修改,提高了通信协议开发和维护的效率。 Based on the characteristics of extensible markup language structure and generalization,based on the analysis of the basic composition,description and verification requirements of the combat system network communication protocol,a general network communication protocol editing software is developed.The graphical human-machine interface is adopted to facilitate the users to quickly formulate,edit and describe the network communication protocol of the combat system,the format of the protocol description file is verified by XSD file.The software supports the automatic generation of communication protocol file according to the protocol content described in the predetermined template.It is convenient for system designers to compile and modify the communication protocol files,and improve the efficiency of development and maintenance of communication protocol.
作者 李俊 李峰纲 高兴利 LI Jun;LI Fenggang;GAO Xingli(Xi’an Fanhua Technology Development Co.,Ltd.,Xi’an 710075,China)
出处 《现代信息科技》 2021年第3期57-60,共4页 Modern Information Technology
关键词 XML结构化描述 XSD格式校验 协议内容预览 协议文件生成 XML structured description XSD format verification agreement content preview protocol file generation
  • 相关文献

参考文献5

二级参考文献24

  • 1叶新铭,孙美飞.IPv6邻居发现协议的一致性测试[J].计算机科学,2005,32(6):43-46. 被引量:3
  • 2王斌.一种身份认证协议的形式化描述与验证[J].甘肃科技纵横,2007,36(2):18-18. 被引量:1
  • 3Woo T, Lam S. A semantic model for antheatication protocols[ A].Proceedings of the IEEE, CS Symposium on Research in Secarity and Privacy[ C], 1993. 178 - 194.
  • 4Syverson P, Meadows C. A logical language for specifying cryptographic protocol requirements[ A]. Proceedings of the IEEE CS Symposium on Research in Security and Privacy[ C]. 1993. 165 -177.
  • 5Gong L. Syverson L. Fail - stop protocols: A new approach to designing secure protocols [ A]. Proceedings of the 5th International Working Conference on Dependable Computing for Critical Applications[ C]. 1995. 44-55,.
  • 6Meadows C. Formal verification of cryptographic protocols: A survey[ A]. In Advances in Cryptology - ASIA CRYPT'94[ C]. 1995. 135- 150.
  • 7Buttyan L, Staamann S, Wilhem U. A simple logic for authentication protocol design[ A]. Proceedings of the IEEE CS Computer Security Foundations Workshop[ C]. 1998.
  • 8Leduc G, Germeau F. Verification of security protocols using LOTOS-method and application[ J]. Computer Communications. 2000,23(12) : 1089 - 1103.
  • 9Lowe G. Breaking and fixing the Needham - Schroeder public key protocol using FDR[A]. Proceedings of the TACAS[C]. 1996. 147- 166.
  • 10Meadows C. The NRL protocol analyzer: an overview. Journel of Logic Programming[ J]. 1996, 26(2) : 113 - 131.

共引文献29

同被引文献17

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部