Skip to main content

Cooperative Model Reconstruction for Cryptographic Protocols Using Visual Languages

  • Conference paper
Groupware: Design, Implementation, and Use (CRIWG 2009)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5784))

Included in the following conference series:

Abstract

Cooperative work in learning environments has been shown to be a successful extension to traditional learning systems due to the great impact of cooperation on students’ motivation and learning success. In this paper we describe a new approach to cooperative construction of cryptographic protocols. Using an appropriate visual language (VL), students describe a protocol step by step, modeling subsequent situations and alternating this with the creation of a concept keyboard (CK) describing the operations in the protocol. The system automatically generates a colored Petri subnet that is matched against an existing action logic specifying the protocol. Finally, the learners implement role-dependent CKs in a cooperative workflow and perform a role-play simulation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baloian, N., Breuer, H., Luther, W.: Concept keyboards in the animation of standard algorithms. Journal of Visual Languages and Computing 6, 652–674 (2008)

    Article  Google Scholar 

  2. Baloian, N., Luther, W.: Cooperative visualization of cryptographic protocols using concept keyboards. To appear in International Journal of Engineering Education (2009)

    Google Scholar 

  3. Weyers, B., Baloian, N., Luther, W.: Cooperative Creation of Concept Keyboards in Distributed Learning Environments. In: Proc. of 13th Int. Conf. on CSCW in Design, pp. 534–539. IEEE, Santiago de Chile (2009)

    Google Scholar 

  4. Kovácová, A.: Implementierung des Needham-Schroeder Protokolls in einer verteilten Simulationsumgebung für kryptografische Standardverfahren, Duisburg (2008)

    Google Scholar 

  5. Ehrig, H., Hoffmann, K., Padberg, J.: Transformations of Petri Nets. Electronic Notes in Theoretical Computer Science 148, 151–172 (2006)

    Article  Google Scholar 

  6. Nickerson, R.R.: On the distribution of cognition: some reflections. Distributed cognitions, 229–259 (1997)

    Google Scholar 

  7. Webb, N.M.: Peer interaction and learning in small groups. International Journal of Education Research 13, 21–39 (1986)

    Article  Google Scholar 

  8. Bos, M.C.: Experimental study of productive collaboration. Acta Psych. 3, 315–426 (1937)

    Article  Google Scholar 

  9. Azmitia, M.: Peer Interaction and Problem Solving: When Are Two Heads Better Than One? Child Development 1, 87–96 (1988)

    Article  Google Scholar 

  10. Stasko, J.: Software visualization. MIT Press, Cambridge (1998)

    Google Scholar 

  11. Diehl, S.: Software visualization. In: Proceedings of the 27th international conference on Software engineering, pp. 718–719 (2005)

    Google Scholar 

  12. Crescenzi, P., Faltin, N., Fleischer, R., Hundhausen, C., Näher, S., Rössling, G., Stasko, J., Sutinen, E.: The Algorithm Animation Repository. In: Proceedings of the 2nd International Program Visualization Workshop, vol. 1, pp. 14–16 (2002)

    Google Scholar 

  13. Cattaneo, G., Santis, A., de Ferraro Petrillo, U.: Visualization of cryptographic protocols with GRACE. Journal of Visual Languages & Computing 19, 258–290 (2008)

    Article  Google Scholar 

  14. Kerren, A., Müldner, T., Shakshuki, E.: Novel algorithm explanation techniques for improving algorithm teaching. In: Proc. of the 2006 ACM Symposium on Soft. Vis., pp. 175–176 (2006)

    Google Scholar 

  15. Shakshuki, E., Kerren, A., Muldner, T.: Web-based Structured Hypermedia Algorithm Explanation system. International Journal of Web Information Systems 3, 179–197 (2007)

    Article  Google Scholar 

  16. Eisenberg, M.: The Thin Glass Line: Designing Interfaces to Algorithms. In: Proceedings of the SIGCHI Conference on Human factors in computing systems, pp. 181–188 (1996)

    Google Scholar 

  17. Archer, B.: Design as a discipline. Design Studies 1, 17–20 (1979)

    Article  Google Scholar 

  18. Meyer, H.: Unterrichts-Methoden. Cornelsen Scriptor, Frankfurt am Main (2008)

    Google Scholar 

  19. Petri Nets World, http://www.informatik.uni-hamburg.de/TGI/PetriNets/tools/quick.html

  20. Ehrig, H., Hoffmann, K., Padberg, J., Ermel, C., Prange, U., Biermann, E., Modica, T.: Petri Net Transformations. Petri Net, Theory and Applications, 534–550 (2008)

    Google Scholar 

  21. Baloian, N., Luther, W.: Algorithm Explanation Using Multimodal Interfaces. In: Proceedings of the XXV International Conference on the Chilean Computer Science Society, vol. 21 (2005)

    Google Scholar 

  22. Chang, S.-K.: Iconic Visual Languages (1997), http://www.cs.pitt.edu/~chang/365/sk1.html

  23. Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21, 993–999 (1978)

    Article  MATH  Google Scholar 

  24. Baumgarten, B.: Petri-Netze. Spektrum Akademischer Verlag, Heidelberg (1996)

    MATH  Google Scholar 

  25. Jensen, K.: Coloured petri nets. Springer, Berlin (1997)

    Book  MATH  Google Scholar 

  26. de Rosis, F., Pizzutilo, S., De Carolis, B.: Formal description and evaluation of user-adapted interfaces. International Journal of Human-Computer Studies 2, 95–120 (1998)

    Article  Google Scholar 

  27. Chang, S.-K.: Syntactic Analysis of Visual Sentences, http://www.cs.pitt.edu/~chang/365/sk2.html

  28. Costagliola, G., Deufemia, V., Polese, G.: Visual language implementation through standard compiler–compiler techniques. Journal of VLs & Computing 18, 165–226 (2006)

    Google Scholar 

  29. Pereira, M.J.V., Mernik, M., da Cruz, D., Henriques, P.R.: VisualLISA: A Visual Interface for an Attribute Grammar–based Compiler-Compiler. In: CoRTA 2008 (2008)

    Google Scholar 

  30. Baloian, N., Breuer, H., Luther, W.: Algorithm visualization using concept keyboards. In: Proceedings of ACM SoftVis 2005, pp. 7–16 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weyers, B., Luther, W., Baloian, N. (2009). Cooperative Model Reconstruction for Cryptographic Protocols Using Visual Languages. In: Carriço, L., Baloian, N., Fonseca, B. (eds) Groupware: Design, Implementation, and Use. CRIWG 2009. Lecture Notes in Computer Science, vol 5784. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04216-4_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04216-4_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04215-7

  • Online ISBN: 978-3-642-04216-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics