{"title":"A Schema of Automated Design Security Protocols","authors":"HaiFeng Xue, Huanguo Zhang, S. Qing","doi":"10.1109/CIS.WORKSHOPS.2007.97","DOIUrl":null,"url":null,"abstract":"This paper proposes a novel approach to automated design of security protocols using artificial immune algorithm based on cord calculs. Designing security protocol is notoriously difficult and error- prone. Artificial immune algorithm is a powerfully intelligent algorithm. The cord calculus is applied to the artificial immune algorithm to instruct the search and compose of security protocols. Automated design of security protocols using artificial immune algorithm can alleviate people's burden of manually design security protocols and get more security and reliable protocols.","PeriodicalId":409737,"journal":{"name":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.WORKSHOPS.2007.97","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper proposes a novel approach to automated design of security protocols using artificial immune algorithm based on cord calculs. Designing security protocol is notoriously difficult and error- prone. Artificial immune algorithm is a powerfully intelligent algorithm. The cord calculus is applied to the artificial immune algorithm to instruct the search and compose of security protocols. Automated design of security protocols using artificial immune algorithm can alleviate people's burden of manually design security protocols and get more security and reliable protocols.