A Unified Method for the Specification and Verification of Protocols

نویسندگان

  • Gregor von Bochmann
  • Jan Gecsei
چکیده

Verification of communication protocols usually involves two parts: a state-machine analysis of the control structure and proving some assertions about the semantic content of the protocol' s actions. The two parts are traditionally, treated separately. This paper suggests that the two approaches are not independent but rather complementary. It intro duces a unified model for protocols (and generally cooperating distant subsystems) encompassing both aspects. The method is demonstrated on three different descriptions of the same protocol, each with a different tradeoff between state machine and programming aspects. Verification of partial and full correctness is carried out in terms of the three descriptions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Web Service Choreography Verification Using Z Formal Specification

Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

The Effectiveness of Unified Trans Diagnostic Treatment Protocols on Parent-Child Interaction and Blood Sugar Levels in Adolescents with Type 1 Diabetes

Objective: The parent-child relationship and the daily blood sugar control by adolescents can affect family functioning. This study aimed to evaluate the effectiveness of unified trans-diagnostic treatment protocols on parent-child interaction and blood sugar levels in adolescents with type 1 diabetes. Materials and Methods: The present study was quasi-experimental with a pretest and posttest ...

متن کامل

A Program Logic for Verifying Secure Routing Protocols

The Internet, as it stands today, is highly vulnerable to attacks. However, little has been done to understand and verify the formal security guarantees of proposed secure inter-domain routing protocols, such as Secure BGP (S-BGP). In this paper, we develop a sound program logic for SANDLog—a declarative specification language for secure routing protocols—for verifying properties of these proto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1977