Formal Verification of Condition Data Flow Diagrams for Assurance of Correct Network Protocols
نویسنده
چکیده
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملPressure Loss Estimation of Three-Phase Flow in Inclined Annuli for Underbalanced Drilling Condition using Artificial Intelligence
Underbalanced drilling as multiphase flow is done in oil drilling operation in low pressure reservoir or highly depleted mature reservoir. Correct determination of the pressure loss of three phase fluids in drilling annulus is essential in determination of hydraulic horsepower requirements during drilling operations. In this paper the pressure loss of solid-gas-liquid three-phase fluids flow in...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملFormal Testing & Algebraic Modelling Techniques for Verifying Cryptographic Protocols
Before trusting a communications security protocol with potentially critical or sensitive information, it is necessary to have some degree of assurance that the protocol fulfils its intended objectives. To provide this assurance it is necessary to use formal verification techniques, as intuitive reasoning does not satisfactorily guarantee complete freedom from protocol errors. In this paper, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003