Composition of service and protocol specifications

被引:5
|
作者
Bista, BB
Takahashi, K
Shiratori, N
机构
关键词
D O I
10.1109/ICOIN.2001.905425
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most important techniques in protocol design is a compositional technique. Using a compositional technique, a large and complex protocol is designed and verified by combining small and simple protocols which are easy to handle, design and verify Unlike the other compositional approaches, we propose compositional techniques far simultaneously combining service specifications and protocol specifications based on Formal Description Techniques(FDTs) called LOTOS. The proposed techniques consider alternative, sequential, and interrupt composition of service specifications and protocol specifications. We use the weak bisimulation equivalence (approximate to), to represent the correctness properties between the service specification and the protocol specification.
引用
收藏
页码:171 / 178
页数:8
相关论文
共 50 条
  • [41] Dynamic service composition and selection through an agent interaction protocol
    Charif-Djebbar, Yasmine
    Sabouret, Nicolas
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WORKSHOPS PROCEEDINGS, 2006, : 105 - +
  • [42] Specifications for the smoking cessation service
    Mendoza, Ana
    Cobian, Belen
    Gomez, Jesus
    Cano, Miguel
    Baixauli, Vicente J.
    FARMACEUTICOS COMUNITARIOS, 2016, 8 (01): : 32 - 38
  • [43] Managing the evolution of service specifications
    Andrikopoulos, Vasilios
    Benbernou, Salima
    Papazoglou, Mike P.
    ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2008, 5074 : 359 - 374
  • [44] Composition of temporal logic specifications
    Alexander, A
    APPLICATIONS AND THEORY OF PETRI NETS 2004, PROCEEDINGS, 2004, 3099 : 98 - 116
  • [45] Parallel composition and decomposition of specifications
    Kahl, W
    INFORMATION SCIENCES, 2001, 139 (3-4) : 197 - 220
  • [46] Composition and refinement of behavioral specifications
    Pavlovic, D
    Smith, DR
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 157 - 165
  • [47] Authentication primitives for secure protocol specifications
    Bodei, C
    Degano, P
    Focardi, R
    Priami, C
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2005, 21 (05): : 645 - 653
  • [48] Verification of protocol specifications with separation logic
    Kiss, Tibor
    Craciun, Florin
    Pary, Bazil
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2015, : 109 - 116
  • [49] Making changes in formal protocol specifications
    Bista, BB
    Takahashi, K
    Kinoshita, T
    Shiratori, N
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1997, E80B (06) : 974 - 978
  • [50] A QoS Aware Service Composition Protocol in Mobile Ad Hoc Networks
    韩松乔
    张申生
    张勇
    曹健
    Journal of Shanghai Jiaotong University(Science), 2008, (02) : 226 - 232