Secure Network Programming: Difference between revisions

Content deleted Content added
mNo edit summary
Removing 2004_ACM_Software_System_Award_presentation.png; it has been deleted from Commons by Krd because: No license since 19 November 2022.
Line 1:
<!-- This page uses text copied from http://www.cs.utexas.edu/users/lam/NRL/SSL.html but that page now carries CC and GNU licences compatible with Wikipedia -->
'''Secure Network Programming''' (SNP) is a prototype of the first [[Secure Sockets Layer]], designed and built by the Networking Research Laboratory at [[the University of Texas at Austin]], led by [[Simon S. Lam]]. This work was published in the 1994 USENIX Summer Technical conference.<ref name="SNP-USENIX">{{cite journal |last1=Woo |first1=Thomas |last2=Bindignavle |first2=Raghuram |last3=Su |first3=Shaowen |last4=Lam |first4=Simon |title=SNP: An Interface for Secure Network Programming |journal=Proceedings USENIX Summer Technical Conference |date=June 1994 |url=http://www.cs.utexas.edu/users/lam/Vita/Cpapers/WBSL94.pdf |accessdate=21 July 2019}}</ref> For this project, the authors won the 2004 [[ACM Software System Award]]. [[File:2004 ACM Software System Award presentation.png|thumb|2004 Software System Award presentation at the Association for Computing Machinery Awards Banquet in San Francisco on June 11, 2005]]
 
This work began in 1991 as a theoretical investigation by the Networking Research Laboratory on the formal meaning of a protocol layer satisfying an upper interface specification as a service provider and a lower interface specification as a service consumer.<ref>{{cite journal |last1=Lam |first1=Simon |last2=Shankar |first2=Udaya |title=A Theory of Interfaces and Modules I — Composition Theorem |journal=IEEE Transactions on Software Engineering |date=January 1994 |volume=20 |pages=55–71 |doi=10.1109/32.263755 |url=https://dl.acm.org/citation.cfm?id=631099 |accessdate=21 July 2019}}</ref>A case study of adding a security layer between the application and network layers was presented.<ref>{{cite journal |last1=Lam |first1=Simon |last2=Shankar |first2=Udaya|last3=Woo |first3=Thomas |title= Applying a Theory of Modules and Interfaces to Security Verification |journal= Proceedings IEEE Symposium on Research in Security and Privacy, Oakland |date=May 1991 |url=https://www.cs.utexas.edu/users/lam/Vita/IEEE/LSW91.pdf | pages=136-154|doi=10.1109/RISP.1991.130782 | access-date=5 January 2021}}</ref>