Formal verification of dependable distributed protocols

被引:3
|
作者
Sinha, P [1 ]
Ren, DQ [1 ]
机构
[1] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ H3G 1M8, Canada
关键词
formal specification and verification; dependable distributed protocols; checkpointing;
D O I
10.1016/S0950-5849(03)00066-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Dependable distributed systems often employ a hierarchy of protocols to provide timely and reliable services. Such protocols have both dependability and real-time attributes, and the verification of such composite services is a problem of growing complexity even when using formal approaches. Our intention in this paper is to exploit the modular design aspects appearing in most dependable distributed protocols to provide formal level of assurance for their correctness. We highlight the capability of our approach through a case study in formal modular specification and tool-assisted verification of a timestamp-based checkpointing protocol. Furthermore, during the process of verification, insights gained in such a stack of protocols have assisted in validating some additional properties those dealing with failure recovery. (C) 2003 Elsevier B.V. All rights reserved.
引用
收藏
页码:873 / 888
页数:16
相关论文
共 50 条
  • [31] Formal verification logic for hybrid security protocols
    Newe, T
    Coffey, T
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2003, 18 (01): : 17 - 25
  • [32] Formal Verification of Consensus Protocols: Survey and Perspective
    Ge, Ning
    He, Yu-Kai
    Zhai, Shu-Mao
    Li, Xiao-Zhou
    Zhang, Li
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (11): : 4989 - 5007
  • [33] Formal description and verification of MAS interaction protocols
    Chen, Hongbing
    Yang, Qun
    Li, Qianmu
    Xu, Manwu
    [J]. MULTIAGENT AND GRID SYSTEMS, 2006, 2 (04) : 353 - 363
  • [34] Formal automatic verification of authentication cryptographic protocols
    Debbabi, M
    Mejri, M
    Tawbi, N
    Yahmadi, I
    [J]. FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 50 - 59
  • [35] Formal Verification of e-Auction Protocols
    Dreier, Jannik
    Lafourcade, Pascal
    Lakhnech, Yassine
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 247 - 266
  • [36] On the formal modeling of inductive verification for cryptographical protocols
    Li, Yongjian
    Song, Xiaoyu
    Li, Xiaojuan
    [J]. 2012 13TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS, AND TECHNOLOGIES (PDCAT 2012), 2012, : 201 - 206
  • [37] Specification and formal verification of interconnect bus protocols
    Ivanov, L
    Nunna, R
    [J]. PROCEEDINGS OF THE 43RD IEEE MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I-III, 2000, : 378 - 382
  • [38] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [39] Towards formal verification of IoT protocols: A Review
    Hofer-Schmitz, Katharina
    Stojanovic, Branka
    [J]. COMPUTER NETWORKS, 2020, 174
  • [40] Formal Verification of a Distributed Computer System
    M. Merritt
    A. Orda
    S.R Sachs
    [J]. Formal Methods in System Design, 1997, 10 : 93 - 125