Specifications and verification of network protocols by process algebra

被引:0
|
作者
Ciobanu, G [1 ]
Sridhar, KN [1 ]
机构
[1] Res Inst E Austria, Timisoara, Romania
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper describes the specification and verification techniques for network protocols, concentrating on one hand on process algebras, and on the other hand on techniques for specific layers. The original contribution is given by new pi-calculus rules representing a set of specific patterns for expressing protocol behavior The paper provides a review of the verification tools, and proposes a few extensions.
引用
收藏
页码:250 / 258
页数:9
相关论文
共 50 条
  • [41] Formal verification and security analysis of FastDFS using process algebra
    Hou, Zhiru
    Zhu, Huibiao
    INTERNET OF THINGS, 2025, 31
  • [42] Modeling and Verification of Reconfigurable Printing System Based on Process Algebra
    Luo, Rubai
    Gao, Shasha
    Li, Huailin
    Zhou, Shisheng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [43] Refinement and Verification of Sequence Diagrams Using the Process Algebra CSP
    Kaizu, Tomohiro
    Isobe, Yoshinao
    Suzuki, Masato
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (02) : 495 - 504
  • [44] Verification of asynchronous logic circuit design using process algebra
    Tokyo Inst of Technology, Tokyo, Japan
    Systems and Computers in Japan, 1997, 28 (08): : 33 - 43
  • [45] Using a process algebra interface for verification and validation of UML statecharts
    Doostali, Saeed
    Babamir, Seyed Morteza
    Javani, Mohammad
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [46] Compositional software verification based on game semantics and process algebra
    Dimovski A.
    Lazić R.
    International Journal on Software Tools for Technology Transfer, 2007, 9 (1) : 37 - 51
  • [47] The Formal Specifications for Protocols of Decoders
    YUAN Meng-ting
    WuhanUniversityJournalofNaturalSciences, 2004, (06) : 879 - 882
  • [48] Intensional specifications of security protocols
    Roscoe, AW
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 28 - 38
  • [49] Verification of Trusted Network Access Protocols in the Strand Space Model
    Xiao, Yuelei
    Wang, Yumin
    Pang, Liaojun
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (03): : 665 - 668
  • [50] A formal methodology for integral security design and verification of network protocols
    Diaz, Jesus
    Arroyo, David
    Rodriguez, Francisco B.
    JOURNAL OF SYSTEMS AND SOFTWARE, 2014, 89 : 87 - 98