The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Formally defined Specification and Description Language (SDL) is used for the design and specification of complex safety-critical systems. Each change in the specification of the product should be immediately checked formally against the requirements’ specification. This paper presents semi-automated system abstraction, automated model extraction, simulation, and formal verification of real-life complex...
Critical infrastructures as water treatment, power distribution, or telecommunications, provide daily services essential to our lifestyle. Any service discontinuity can have a high impact into our society and even into our safety. Thus, security of these systems against intentional threats must be guaranteed. However, many of these systems are based on protocols initially designed to operate on closed,...
The security of Radio-Frequency Identification (RFID) tags are one of the key prerequisites for its commercial application. Due to its limited computing power, formal verification protocols are an important prerequisite to effectively answering the challenges of security in RFID systems. By means of nuXmv, a clear and concise symbolic model checker, a methodology for verifying RFID protocols is put...
Security protocols are the key to ensure network security. In the context of the state of the art, so many methods have been developed to analyze the security properties of security protocols, such as Ban logic, theorem proving and model checking etc. This paper used model checking method to formally verify security protocols because of its high degree of automation, briefness and effectiveness. The...
This paper is devoted to SDNs verification. The main problems in deployment and maintenance process are analyzed. Methods of formal verification are suggest as way to check correctness and corresponds to the requirement. The modification of Model Checking proposed for verification the main feature of OpenFlow protocol.
In this paper, we present different modeling and execution frameworks that allow us to efficiently analyze, design and verify complex systems, mainly to cope with the specific concerns of the Real-time and embedded systems (RTE) domain. First we depict a UML /MARTE based methodology for executable RTE systems modeling with a framework and its underlying model transformations required to execute UML...
This paper presents the process of simulation development for agent interaction protocol. Previously, a set of four interaction protocols for agent-based e-learning system is specified using the ISLANDER. Now, it is time to develop a suitable simulation in order to test the specified protocols using Easy Java Simulation (EJS). Our idea is to present two types of Graphical User Interface (GUIs) to...
Dense collection of tiny Sensor Nodes (SNs), equipped with a variety of sensors are able to sense events, compute and communicate the estimations to the end user, form a distributed Wireless Sensor Network (WSN). The advances in WSNs have made it plausible to appraise critical aspects of object tracking WSNs that are continuous monitoring of object track and fault tolerance. This paper presents probabilistic...
Automated verification plays vital roles on concurrent system design. PROMELA, as a popular system description language, has been widely used for this purpose. PROMELA models can be analyzed with the SPIN model checker, which is, however, deficient with respect to perform verification under strong fairness. In this work, we represent a translator that can translate PROMELA models into CSP# models...
This paper gives a brief overview of version 3.3 of PRISM, a tool for the automatic formal verification of probabilistic systems, and some of the case studies to which it has already been applied to date.
This paper describes the application of real-time Maude to the formal modeling, simulation, and model checking analysis of the NORM multicast protocol standard being developed by the Internet engineering task force. Because of its size and sophistication, real-time features, and the need to model and analyze subcomponents of NORM both in isolation and in combination, NORM poses a set of challenging...
We consider a distributed shuffling algorithm for sharing data in a distributed network. Nodes executing the algorithm periodically contact each other and exchange data. The behavior of the algorithm is probabilistic in nature; a node chooses a random peer and sends a random subset of its local data. Moreover, the algorithm exhibits nondeterministic behavior; the order in which nodes initiate an exchange...
In previous works we suggested an approach to verify if in a component-based system the interaction behavior to a component obeys the specified requirements.We can capture unbounded recursion, synchronous method calls and call backs as well as asynchronous method calls and unbounded parallel behavior including synchronization.In an industrial environment we have the problem, that extensive use of...
Workflow management promises a new solution to an ancient problem: monitoring, controlling and supporting business processes. What is new about workflow management is the explicit representation of the business process logic. Traditional workflow management models have obvious shortcomings in describing complex workflows. Such complexity is due not only to the complicated dependencies among tasks,...
As a special kind of security protocol, ecommerce protocols have been analyzed with many formal methods in recent years. However, there is no general specification and verification model checking method to be applied effectively to the four special properties in ecommerce protocols--non-repudiation, accountability, fairness, and timeliness. Based on our previous work on the suitability of colored...
In order to make secure transactions over networks, various protocols have been proposed, but there are subtleties involved in original protocol design, some of them have been found after a long time after publication. In this paper, we used model checking method by means of SMV to verify SET protocol in electronic commerce. Model checking combines some of the advantages of both testing and theorem...
In order to further verify whether there still exists defect in the design of wireless transaction protocol (WTP), WTP is formally analyzed by model checking. First, WTP is modeled by finite state automatas (FSAs). Then the security property of the protocol is specified by computation tree logic (CTL). Finally, the obtained model and security property are verified by symbolic model verifier (SMV)...
Web services choreography describes the global model of service interactions among a set of participants. In order to achieve a common business goal, the protocols of interaction must be correct. In this paper, we model interactions with recordings of state/channel variable changes that can occur as a result of carrying out the interactions. Thus, it is possible to verify not only normal control flow...
Formal method has been advocated as an important means of improving the safety and reliability of software systems, especial those which are safety-critical. We propose a new simple trace semantics that can be used to specify security properties. Our technique support a protocol designer to provide formal analysis of the security properties. We illustrate the utility of our technique by exposing two...
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of intellectual property or secrets to a remote party with a reasonable security that such secrets will...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.