Correction to "Specification and Verification of Communication Protocols in AFFIRM Using State Transition Models"

نویسندگان

  • Carl A. Sunshine
  • David H. Thompson
  • Roddy W. Erickson
  • Susan L. Gerhart
  • Daniel Schwabe
چکیده

Language Issues An Object-Oriented Command Language ............................................ R. T. Snodgrass 1 A Symbol Table Abstraction to Implement Languages with Explicit Scope Control . . R. P. Cook and T. J. LeBlanc 8 Simulation of Procedure Variables Using Ada Tasks ......................... D. A. Lamb and P. N. Hilfinger 13 Language Features for Access Control .............................. P. Ancilotti, M. Boari, and N. Lijtmaer 16 A Practical Method for Reducing Weak Precedence Parsers ............ J. Aoe, Y. Yamamoto, and R. Shimada 25 Programming Language Constructs for Screen Definition ....................... L. A. Rowe and K. A. Shoens 31 A Generalized Query-by-Example Data Manipulation Language Based on Database Logic ....................

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Web Service Choreography Verification Using Z Formal Specification

Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Formal Complexity-Oriented Performance-Critical Design and Verification Framework Configurable Communication Systems Perspective

This thesis develops a formal framework for the specification, complexity analysis and verification of functional and performance requirements of configurable communication systems and protocols. The main objective is demonstrating the applicability of the proposed framework for the modelling and verification of a realistic system. Design-for-Verification principles are demonstrated, such as th...

متن کامل

Transducer-Based Algorithmic Verification of Retransmission Protocols over Noisy Channels

Unreliable communication channels are a practical reality. They add to the complexity of protocol design and verification. In this paper, we consider noisy channels which can corrupt messages. We present an approach to model and verify protocols which combine error detection and error control to provide reliable communication over noisy channels. We call these protocols retransmission protocols...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Software Eng.

دوره 9  شماره 

صفحات  -

تاریخ انتشار 1983