Modelling and Veri cation of Biphase Mark Protocols in Duration Calculus Using PVS

نویسنده

  • Dang Van Hung
چکیده

The paper presents a model of Biphase Mark Protocols (BMP) using Duration Calculus, which seems to be more general and more intuitive than the others in the literature 9]. With Duration Calculus we can model the behaviour of the bus in a natural way and in more detail. The model makes it possible to specify and verify BMP using PVS/DC ? 8] tool. The mechanical veriication not only ensures the correctness of the protocol, but also helps engineers to choose the optimal values for the parameters given the ratio between the clock rates of the sender and the receiver and the time for changing the signal from high to low and low to high.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling and Verification of Biphase Mark Protocolsin Duration Calculus Using PVS

The paper presents a model of Biphase Mark Protocols (BMP) using Duration Calculus, which seems to be more general and more intuitive than the others in the literature [9]. With Duration Calculus we can model the behaviour of the bus in a natural way and in more detail. The model makes it possible to specify and verify BMP using PVS/DC− [8] tool. The mechanical verification not only ensures the...

متن کامل

Modelling and Verification of Biphase Mark Protocols Using PVS/DC−

The paper presents a model of Biphase Mark Protocols (BMP) using Duration Calculus, which seems to be more general and more intuitive than the others in the literature [10]. With Duration Calculus we can model the behaviour of the bus in a natural way and in more detail. The model makes it possible to specify and verify BMP using PVS/DC− [9] tool. The mechanical verification not only ensures th...

متن کامل

Modelling and Veriication of Biphase Mark Protocols Using Pvs/dc ? Modelling and Veriication of Biphase Mark Protocols Using Pvs/dc ?

UNU/IIST UNU/IIST enables developing countries to attain self-reliance in software technology by: (i) their own development of high integrity computing systems, (ii) highest level postgraduate university teaching, (iii) international level research, and, through the above, (iv) use of as sophisticated software as reasonable. UNU/IIST contributes through: (a) advanced, joint industry{university ...

متن کامل

Formal Verification of Real time Software

The veri cation of functionality of the input output logic properties often composes the majority of software requirements analysis Automated theorem provers ATPs such as SRI s Prototype Veri cation System PVS have been successfully used in the formal veri cation of functional properties However such functional methods are not readily applicable to the veri cation of the real time software re q...

متن کامل

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs Bell Labs Murray Hill New Jersey USA

This paper presents an application of PVS to the veri cation of security protocols The objective is to provide mechanical support for a veri cation method described in The PVS formalization consists of a semantic embedding of CSP and of a collection of theorems and proof rules for reasoning about authentication properties We present an application to the Needham Schroeder public key protocol

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998