Specification and Verification of Protocols With Time Constraints
نویسندگان
چکیده
منابع مشابه
automatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولFormal Specification and Verification of Task Time Constraints for Real-Time Systems
Model-Driven Engineering enables to assess a system’s model properties since the early phases of its lifecycle and to improve iteratively these models according to the verification results. Safety critical real-time systems have stringent requirements related to the specification and verification of system’s task-level time constraints. The common formal methods used to assess these properties ...
متن کاملConstraints-based Verification of Parameterized Cryptographic Protocols
Cryptographic protocols are crucial for securing electronic transactions. The confidence in these protocols can be increased by the formal analysis of their security properties. Although many works have been dedicated to standard protocols like Needham-Schroder very few address the more challenging class of group protocols. We present a synchronous model for group protocols, that generalizes st...
متن کاملAutomatic Verification of Directory-Based Consistency Protocols with Graph Constraints
We propose a symbolic verification method for directory-based consistency protocols working for an arbitrary number of controlled resources and competing processes. We use a graph-based language to specify in a uniform way both client/server interaction schemes and manipulation of directories that contain the access rights of individual clients. Graph transformations model the dynamics of a giv...
متن کاملA Unified Method for the Specification and Verification of Protocols
Verification of communication protocols usually involves two parts: a state-machine analysis of the control structure and proving some assertions about the semantic content of the protocol' s actions. The two parts are traditionally, treated separately. This paper suggests that the two approaches are not independent but rather complementary. It intro duces a unified model for protocols (and gen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2004
ISSN: 1571-0661
DOI: 10.1016/j.entcs.2004.02.009