Features of a visualization tool for specification and analysis of security protocol

Mabroka Ali Mayouf, Zarina Shukur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Visualization tools can be an effective and entertaining means to teach students concepts in the class room. Providing accessibility to the tools allows motivated students to interact "live" with visualizations. Security protocols are an important concept in teaching information and network security. Students need to understand both the sequence of passed information, computations and analysis. In this paper, we propose an animated interactive visualization tool for teaching undergraduate students security protocols (design and analysis of authentication protocols). The student can play the animation to see the protocol in action. They can also realize and define the protocol problems by using an interactive (animation) analyzer, included within the tool, to determine the exact invalid section of the running protocol.

Original languageEnglish
Title of host publicationProceedings - International Symposium on Information Technology 2008, ITSim
Volume3
DOIs
Publication statusPublished - 2008
EventInternational Symposium on Information Technology 2008, ITSim - Kuala Lumpur
Duration: 26 Aug 200829 Aug 2008

Other

OtherInternational Symposium on Information Technology 2008, ITSim
CityKuala Lumpur
Period26/8/0829/8/08

Fingerprint

Visualization
Students
Specifications
Animation
Teaching
Network security
Security of data
Authentication

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Mayouf, M. A., & Shukur, Z. (2008). Features of a visualization tool for specification and analysis of security protocol. In Proceedings - International Symposium on Information Technology 2008, ITSim (Vol. 3). [4631867] https://doi.org/10.1109/ITSIM.2008.4631867

Features of a visualization tool for specification and analysis of security protocol. / Mayouf, Mabroka Ali; Shukur, Zarina.

Proceedings - International Symposium on Information Technology 2008, ITSim. Vol. 3 2008. 4631867.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mayouf, MA & Shukur, Z 2008, Features of a visualization tool for specification and analysis of security protocol. in Proceedings - International Symposium on Information Technology 2008, ITSim. vol. 3, 4631867, International Symposium on Information Technology 2008, ITSim, Kuala Lumpur, 26/8/08. https://doi.org/10.1109/ITSIM.2008.4631867
Mayouf MA, Shukur Z. Features of a visualization tool for specification and analysis of security protocol. In Proceedings - International Symposium on Information Technology 2008, ITSim. Vol. 3. 2008. 4631867 https://doi.org/10.1109/ITSIM.2008.4631867
Mayouf, Mabroka Ali ; Shukur, Zarina. / Features of a visualization tool for specification and analysis of security protocol. Proceedings - International Symposium on Information Technology 2008, ITSim. Vol. 3 2008.
@inproceedings{c812b7fa382347c5944dcebac4d5fba3,
title = "Features of a visualization tool for specification and analysis of security protocol",
abstract = "Visualization tools can be an effective and entertaining means to teach students concepts in the class room. Providing accessibility to the tools allows motivated students to interact {"}live{"} with visualizations. Security protocols are an important concept in teaching information and network security. Students need to understand both the sequence of passed information, computations and analysis. In this paper, we propose an animated interactive visualization tool for teaching undergraduate students security protocols (design and analysis of authentication protocols). The student can play the animation to see the protocol in action. They can also realize and define the protocol problems by using an interactive (animation) analyzer, included within the tool, to determine the exact invalid section of the running protocol.",
author = "Mayouf, {Mabroka Ali} and Zarina Shukur",
year = "2008",
doi = "10.1109/ITSIM.2008.4631867",
language = "English",
isbn = "9781424423286",
volume = "3",
booktitle = "Proceedings - International Symposium on Information Technology 2008, ITSim",

}

TY - GEN

T1 - Features of a visualization tool for specification and analysis of security protocol

AU - Mayouf, Mabroka Ali

AU - Shukur, Zarina

PY - 2008

Y1 - 2008

N2 - Visualization tools can be an effective and entertaining means to teach students concepts in the class room. Providing accessibility to the tools allows motivated students to interact "live" with visualizations. Security protocols are an important concept in teaching information and network security. Students need to understand both the sequence of passed information, computations and analysis. In this paper, we propose an animated interactive visualization tool for teaching undergraduate students security protocols (design and analysis of authentication protocols). The student can play the animation to see the protocol in action. They can also realize and define the protocol problems by using an interactive (animation) analyzer, included within the tool, to determine the exact invalid section of the running protocol.

AB - Visualization tools can be an effective and entertaining means to teach students concepts in the class room. Providing accessibility to the tools allows motivated students to interact "live" with visualizations. Security protocols are an important concept in teaching information and network security. Students need to understand both the sequence of passed information, computations and analysis. In this paper, we propose an animated interactive visualization tool for teaching undergraduate students security protocols (design and analysis of authentication protocols). The student can play the animation to see the protocol in action. They can also realize and define the protocol problems by using an interactive (animation) analyzer, included within the tool, to determine the exact invalid section of the running protocol.

UR - http://www.scopus.com/inward/record.url?scp=57349098693&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57349098693&partnerID=8YFLogxK

U2 - 10.1109/ITSIM.2008.4631867

DO - 10.1109/ITSIM.2008.4631867

M3 - Conference contribution

AN - SCOPUS:57349098693

SN - 9781424423286

VL - 3

BT - Proceedings - International Symposium on Information Technology 2008, ITSim

ER -