Abstract
No abstract available.
Cited By
- Delaware B, Suriyakarn S, Pit-Claudel C, Ye Q and Chlipala A (2019). Narcissus: correct-by-construction derivation of decoders and encoders from binary formats, Proceedings of the ACM on Programming Languages, 3:ICFP, (1-29), Online publication date: 26-Jul-2019.
- Ye Q and Delaware B A verified protocol buffer compiler Proceedings of the 8th ACM SIGPLAN International Conference on Certified Programs and Proofs, (222-233)
- Chung T, Lok J, Chandrasekaran B, Choffnes D, Levin D, Maggs B, Mislove A, Rula J, Sullivan N and Wilson C Is the Web Ready for OCSP Must-Staple? Proceedings of the Internet Measurement Conference 2018, (105-118)
- Liu Y, Tome W, Zhang L, Choffnes D, Levin D, Maggs B, Mislove A, Schulman A and Wilson C An End-to-End Measurement of Certificate Revocation in the Web's PKI Proceedings of the 2015 Internet Measurement Conference, (183-196)
- Fisher K and Walker D The PADS project Proceedings of the 14th International Conference on Database Theory, (11-17)
- Dietrich K and Winter J A secure and practical approach for providing anonymity protection for trusted platforms Proceedings of the 12th international conference on Information and communications security, (311-324)
- Dąbrowska-Kubik K Semantic network of ground station-satellite communication system Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III, (369-378)
- Wang L, Liang J, Naiguang Z, Jinhui X and Peiyu G A content authentication method for digital television Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 1, (445-447)
- Fisher K, Mandelbaum Y and Walker D (2010). The next 700 data description languages, Journal of the ACM, 57:2, (1-51), Online publication date: 1-Jan-2010.
- Barlas K, Koletsos G, Stefaneas P and Ouranos I From ASN.1 into CafeOBJ Proceedings of the 2009 Fourth South-East European Workshop on Formal Methods, (66-72)
- AboElFotoh M, Dean T and Mayor R An empirical evaluation of a language-based security testing technique Proceedings of the 2009 Conference of the Center for Advanced Studies on Collaborative Research, (112-121)
- Shin J, Kim J and Ivezic N Message-independent test harness for content-level test of B2B standards Proceedings of the 10th IEEE international conference on Information Reuse & Integration, (74-78)
- Dahlin A, Ersfolk J, Yang G, Habli H and Lilius J The canals language and its compiler Proceedings of th 12th International Workshop on Software and Compilers for Embedded Systems, (43-52)
- Romano L, Vianello V, D'antonio S and Giordano S Using data correlation to build an intrusion detection system Proceedings of the 10th WSEAS international conference on Automation & information, (342-347)
- Wang L, Guo P, Xie J, Yao Y and Liang J A New Rights Processing Method for DRM Systems Proceedings of the 2009 International Asia Conference on Informatics in Control, Automation and Robotics, (278-281)
- Liu C, Billard A, Ozols M and Jeremic N Access control models and security labelling Proceedings of the thirtieth Australasian conference on Computer science - Volume 62, (181-190)
- Zhang S, Dean T and Knight S A lightweight approach to state based security testing Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research, (28-es)
- Marquis S, Dean T and Knight S Packet decoding using context sensitive parsing Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research, (20-es)
- Tsai Y and Chang C (2006). SIM-based subscriber authentication mechanism for wireless local area networks, Computer Communications, 29:10, (1744-1753), Online publication date: 1-Jun-2006.
- Risso F and Baldi M (2006). NetPDL, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:5, (688-706), Online publication date: 6-Apr-2006.
- Marquis S, Dean T and Knight S SCL Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research, (155-164)
- Klint P, Lämmel R and Verhoef C (2005). Toward an engineering discipline for grammarware, ACM Transactions on Software Engineering and Methodology (TOSEM), 14:3, (331-380), Online publication date: 1-Jul-2005.
- Fisher K and Gruber R PADS Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, (295-304)
- Fisher K and Gruber R (2005). PADS, ACM SIGPLAN Notices, 40:6, (295-304), Online publication date: 12-Jun-2005.
- Wang H, Guo C, Simon D and Zugenmaier A (2019). Shield, ACM SIGCOMM Computer Communication Review, 34:4, (193-204), Online publication date: 30-Aug-2004.
- Wang H, Guo C, Simon D and Zugenmaier A Shield Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (193-204)
- Rinderknecht C Proving a soundness property for the joint design of ASN.1 and the basic encoding rules Proceedings of the 4th international SDL and MSC conference on System Analysis and Modeling, (154-170)
Index Terms
- ASN.1: communication between heterogeneous systems
Recommendations
Mapping between ASN.1 and XML
SAINT '01: Proceedings of the 2001 Symposium on Applications and the Internet (SAINT 2001)Abstract Syntax Notation One (ASN.1) is a framework for representing tree structured data. Since ASN.1 data are structured data, it should be possible to represent the same information in Extensible Markup Language (XML). The translation between ASN.1 ...
Representation of ASN.1 in APL nested structures
APL '00: Proceedings of the international conference on APL-Berlin-2000 conferenceAbstract Syntax Notation One, or ASN.1, is a standardized data format for data networks and open system communications, defined by the ITU. Several TCP/IP protocols and security applications are based on it. In order to use APL to implement software ...