Verifying an ATM Protocol Using a Combination of Formal Techniques
نویسنده
چکیده
ions of infinite state systems compositionally and automatically. In Proc. 10th Int. Conf. Computer Aided Verification (CAV’98), Vancouver, BC, Canada, June 28– July 2, pp. 319–331. Springer-Verlag, Berlin. [11] Burch, J. R., Clarke, E. M., McMillan, K. L., Dill, D. L. andHwang, L. J. (1992) Symbolic model checking: 10 states andbeyond. Inform. Comput., 98, 142–170. [12] Recommendation Q.2110 (1994) ATM Adaptation Layer—Service Specific Connection Oriented Protocol. [13] Henderson, T. and Katz, R. (1999) Transport protocols forinternet-compatible satellite networks. IEEE J. Selected AreasCommuni., 17, 326–244. [14] Telelogic SDL products http://www.telelogic.com/products/sdl. [15] Abdulla, P. A., Jonsson, B., Kindahl, M. and Peled, D. (1998) A general approach to partial order reductions in symbolic verification (extended abstract). In Proc. 10th Int. Conf. Computer Aided Verification (CAV’98), Vancouver, BC, Canada, June 28–July 2, pp. 379–390. Springer-Verlag, Berlin. [16] Godefroid, P. (1996) Partial-Order Methods for theVerification of Concurrent Systems—An Approach to theState-Explosion Problem, Springer Verlag, Berlin. [17] Katz, S. and Peled, D. (1992) Defining conditional indepen-dence using collapses. Theor. Comp. Sci., 101, 337–359. [18] Saı̈di, H. and Shankar, N. (1999) Abstract and model check while you prove. In Proc. 11th Int. Conf. Computer Aided Verification (CAV’99), Trento, Italy, July 6–10, pp. 443–454. Springer-Verlag, Berlin. [19] Havelund, K. and Shankar, N. (1996) Experiments in theorem proving and model checking for protocol verification. In Proc. Third Int. Symp. Formal Methods Europe (FME’96), Oxford, UK, March 18–22, pp. 662–681. Springer-Verlag, Berlin. [20] Bozga, M., Fernandez, J.-C., Ghirvu, L., Graf, S., Krimm, J.-P. and Mounier, L. (2000) If: a validation environment for timed asynchronous systems. In Proc. 12th Int. Conf. Computer Aided Verification (CAV’00), Chicago, IL, USA, July 15–19, pp. 543–547. Springer-Verlag, Berlin. [21] Bozga, M., Fernandez, J.-C., Ghirvu, L., Jard, C., Jéron, T., Kerbrat, A., Morel, P. and Mounier, L. (2000) Verification andtest generation for the sscop protocol. Science of ComputerProgramming, 36, 27–52. [22] Rusu, V. (2004) Verifying an ATM Protocol Using A Com-bination of Formal Techniques, Technical Report 5089. INRIA. [23] Rusu, V. (2003) Compositional verification of an ATM protocol. In Proc. Int. Sym. Formal Methods Europe (FME’03), Pisa, Italy, September 8–14, pp. 223–243. Springer-
منابع مشابه
Verifying Multiparty Call in ATM UNI Signalling Protocol
This paper presents formal specification and verification of the multiparty call in ATM UNI signalling protocol. The protocol specification is written in the CCS process algebra (Calculus of Communicating Systems). Verification is done by using the NCSU-Concurrency Workbench. Due to the complexity of the protocol, the model is decomposed into three components. The protocol is verified by the mo...
متن کاملThe Formal Veriication of an Atm Network 1
Communication networks are rapidly becoming all pervasive. As this occurs, the consequences of errors in the design or implementation of network components becomes increasingly important. This is especially so if, as is increasingly probable, networks are used in safety-critical applications where communication problems could cause loss of life. Asynchronous Transfer Mode (ATM) is a relatively ...
متن کاملFormal Veri cation of an Asynchronous MAC Layer Protocol in VIS
Model checking techniques have established themselves as signiicant means in early detection of design errors. When a higher layer protocol is implemented in hardware and we want to verify its implementation satisfying the speciication, it cannot be handled by software (protocol) model checking tools as most of these tools are based on an interleaving model unlike the hardware implementations, ...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملFormal Testing & Algebraic Modelling Techniques for Verifying Cryptographic Protocols
Before trusting a communications security protocol with potentially critical or sensitive information, it is necessary to have some degree of assurance that the protocol fulfils its intended objectives. To provide this assurance it is necessary to use formal verification techniques, as intuitive reasoning does not satisfactorily guarantee complete freedom from protocol errors. In this paper, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Comput. J.
دوره 49 شماره
صفحات -
تاریخ انتشار 2006