Multi-Level Verification of Clinical Protocols
نویسندگان
چکیده
In the medical domain, clinical practice guidelines and protocols build a commonly accepted way to improve patient health care. During the last years various approaches have been presented to support the computerization of such guidelines and protocols. However, the verification of clinical protocols has not become an extensive research topic yet. In this paper we will present a partial and domain-specific verification approach to identify particular anomalies in protocols. Our approach is oriented on a plan-representation language of clinical protocols given as temporal, skeletal plans, called Asbru. Asbru provides the necessary hierarchical structure and task-specific knowledge roles, which are needed to divide the whole verification process in subtasks. Our verification approach examines three levels of a plan: the plan itself, all its knowledge roles and all its subplans. The final aim is to arrive at legal or meaningful plans, instead of complete or totally correct plans.
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملAutomatic verification of epistemic specifications under convergent equational theories
We present a methodology for the automatic verification of multi-agent systems against temporal-epistemic specifications derived from higher-level languages defined over convergent equational theories. We introduce a modality called rewriting knowledge that operates on local equalities. We discuss the conditions under which its interpretation can be approximated by a second modality that we int...
متن کاملMCjammer: An Adaptive Verification Tool for Multi-core and Multi-processor Designs
The challenge of verification of multi-core and multi-processor designs grows dramatically with each new generation of systems produced today. Validation of memory coherence and memory consistency of the entire system, which includes multiple levels of cache and complex protocols, remains a major fraction of this difficult task. Unfortunately, current tools are incapable of addressing these new...
متن کاملMulti-Protocol Attacks: A Survey of Current Research
Traditionally, verification methods for security protocols typically assume that the protocols are used in isolation of other protocols (i.e., there is only a single protocol using a network at a given time). However, in practice it is unrealistic to assume that a security protocol runs in isolation in an insecure network. A multi-protocol attack is an attack in which more than one protocol is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998