481,617 Hits in 6.5 sec

EVP: Integration of FDTs for the analysis and verification of communication protocols [chapter]

P. Merino, J. M. Troya
1996 Lecture Notes in Computer Science  
EVP is an integrated tool-set for specification and the analysis of communication protocols and distributed systems.  ...  The common language is a concmztnt logic language Slx~ially designed for distributed programming. The analysis consists in interactive simulation and automatic verification.  ...  Conclusions and Further Work The GISUM group has designed and constructed an environment for the analysis of protocol specifications using different FDTs.  ... 
doi:10.1007/3-540-61474-5_90 fatcat:uamufsuovrf6rmb2dqveac447i

Using Process Algebra to Design Better Protocols [chapter]

Peter Höfner
2016 The Role and Importance of Mathematics in Innovation  
Despite the maturity of formal description languages and formal methods for analyzing them, the description of real protocols is still overwhelmingly informal.  ...  The consequences of informal protocol description drag down industrial productivity and impede research progress". Pamela Zave [18]  ...  Formal Specification Languages I believe that formal specification languages and analysis techniques are now able to capture the full syntax and semantics of reasonably rich protocols.  ... 
doi:10.1007/978-981-10-0962-4_8 fatcat:tvoe74227ndntds5qolrdb2gta

Protocol specification for OSI

Gregor V Bochmann
1990 Computer networks and ISDN systems  
This paper has been written as a tutorial on questions related to protocol specifications. It provides certain basic definitions related to protocol specifications and specification languages.  ...  In this context, the protocol specifications are of particular importance, since they represent the standards which are the basis for the implementation and testing of compatible OSI systems.  ...  The analysis corresponds to a part of what compilers do for programming languages.  ... 
doi:10.1016/0169-7552(90)90132-c fatcat:avhuude4dbclfiz5j5yellrqkm


Amol H. Shinde, Umbarkar A.J., Pillai N.R.
2017 ICTACT Journal on Communication Technology  
In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.  ...  These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security.  ...  For verifying a protocol using Murφ, first the protocol should be modeled in the Murφ language and then this model is augmented with the specification of desired properties.  ... 
doi:10.21917/ijct.2017.0226 fatcat:cjtshuv25rbvjggalyzy7xtdkq

A Role-based Specification of the SET Payment Transaction Protocol [chapter]

Hideki Sakurada, Yasuyuki Tsukada
2002 IFIP Advances in Information and Communication Technology  
Our specification can serve as a starting point for a formal analysis of the protocol.  ...  In this paper, we define a language for specifying security protocols concisely and unambiguously.  ...  Acknowledgments The authors thank Kazuo Ohta, Akira Takura, and Kiyoshi Shirayanagi for their helpful comments and encouragement.  ... 
doi:10.1007/0-306-46958-8_1 fatcat:stm45rf6d5dxhhl6l6dktdrpmm

Automatic protocol-conformance recommendations

Ernesto J. Alfonso
2011 Proceedings of the ACM international conference companion on Object oriented programming systems languages and applications companion - SPLASH '11  
Misuse of reusable components in software is common. Systems of software analysis based on formal specifications provide a mechanism for automatically detecting nonconformance to protocols.  ...  The focus of this research is to automatically generate task-specific user recommendations for correcting misuse of arbitrary protocols using results from software analysis systems.  ...  Generating Fusion Suggestions Fusion provides an expressive specification language to encode arbitrary software protocols, and we define A and H within the context of this analysis system.  ... 
doi:10.1145/2048147.2048210 dblp:conf/oopsla/Alfonso11 fatcat:nroibaxzgvfyfb52g4uinyvlp4

The Pandora system: An interactive system for the design of data communication protocols

Gerard J Holzmann
1984 Computer Networks (1976)  
PANDORA is an interactive system for the analysis, synthesis, and real-time assessment of data communication protocols.  ...  This paper gives an overview of the structure of the system and discusses the main design goals.  ...  The design and construction of the Pandora system was made possible by a grant from the Netherlands PTT, under contract number 45155 OCA.  ... 
doi:10.1016/0376-5075(84)90036-9 fatcat:udadok7pjvgwbfh5dxzolwsm2i

Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification

S Gritzalis, D Spinellis, P Georgiadis
1999 Computer Communications  
Modern high-level specification languages and tools can be used for automatically analysing cryptographic protocols.  ...  Finally, an outline is presented on current trends for the utilisation of formal methods for the analysis and verification of modern complicated protocols and protocol suites for the real commercial world  ...  Boyd, Queensland University of Technology, W. Mao, Hewlett-Packard, and the anonymous referees for their insightful remarks and constructive comments.  ... 
doi:10.1016/s0140-3664(99)00030-4 fatcat:cv3vmaztf5drxc2edllnfgefva

A new Approach to Performance Evaluation of Formally Specified Protocols [chapter]

Stefan Böhmer, Ralf Klafka
1995 IFIP Advances in Information and Communication Technology  
A main focus is on semi-automatic generation of a program for stochastic simulation directly from a given protocol specification in SDL.  ...  A concept as well as an implementation is shortly described which combines the techniques of formal specification and stochastic simulation.  ...  impact on the further development of the SDL language: through the use of SDL as a language for protocol implementation it will be possible to orientate the SDL standardization process closer to user  ... 
doi:10.1007/978-0-387-34878-0_37 fatcat:lutznlk5hjgdler6hiqtw2bryu

Animation of Natural Language Specifications of Authentication Protocols

Mabroka Ali Mayouf, Zarina Shukur
2008 Journal of Computer Science  
Problem Statement: A few visualization tools have been created for protocol design and analysis.  ...  For specification, a language needs to be intuitive as well as easily usable and understandable by the security protocol engineer.  ...  ACKNOWLEDGMENT We acknowledge MontyLingua and it's author Hugo Liu ( montylingua).  ... 
doi:10.3844/jcssp.2008.503.508 fatcat:lafvvfarcbewvang5utpgzwujq

Page 1 of Journal of Research and Practice in Information Technology Vol. 27, Issue 1 [page]

1995 Journal of Research and Practice in Information Technology  
Ordering Specifications, has been conceived in the framework of OSI standardisation as a tool for the formal description of protocols (Lagemaat and Scollo, 1988; Najm, 1989).  ...  It is based on the FDT LOTOS. A LC «OS specification is the starting point for analysing protocols using LOLA.  ... 

Design of SD/eMMC Protocol Compliance Solutions

Aparna N, Mamatha H R, Dheerendra Singh Tomar, Rakesh Kumar
2014 International Journal of Applied Information Systems  
The system proved to be a complete solution that performs processing as well as analysis of protocol data that verifies the compliance of SD/eMMC protocol with respective specifications.  ...  It clearly fills the limitations of existing system. The proposed system make use of low cost handy LA and a three layered wrapper is developed for decode, analysis and ease of use.  ... 
doi:10.5120/ijais14-451215 fatcat:vutmvgguzzcl5cx3ikvwcl72vm

Protocol design: redefining the state of the art

G.J. Holzmann
1992 IEEE Software  
(And where experience is, of course, a nice word for the history of mistakes that a programmer is not likely to make more than once.)  ...  Before we can solve the protocol design problem in this way, we will need two things: (1) Adequate specification languages to formalize protocol definitions and design requirements (2) Effective validation  ...  Specification The protocol validation systems of the early eighties required a great deal of human ingenuity in preparing a protocol specification for validation.  ... 
doi:10.1109/52.108773 fatcat:r4bgn3ewevhitbw3ddesatv5oy

Using protean for verifying a complex protocol — A case study

R. Lai
1995 Software, Practice & Experience  
This paper describes the experience and practice of using PROTEAN to verify a complex protocol and then presents an evaluation of PROTEAN and its associated techniques in the light of protocol software  ...  Protocol verification plays a major role in achieving these objectives; a protocol is first specified formally and then this formal specification is analysed using a computer-aided tool.  ...  ACKNOWLEDGEMENT The use of the PROTEAN software made available by Telecom Australia Research Laboratories is acknowledged.  ... 
doi:10.1002/spe.4380250906 fatcat:hfzsz3osc5dwvaiwcagm7ejdou

Formal Methods in Communication Protocol Design

G. Bochmann, C. Sunshine
1980 IRE Transactions on Communications Systems  
serves as Vice-chairman (United States) of IFIP Working Group 6.4 on Local Computer Networks.  ...  However, the use of these systems is not trivial, and much work goes into representing the protocol and service in a form suitable for analysis.  ...  The analysis checked for general correctness properties of completeness and deadlock, and. uncovered a number of completeness errors (i.e., a protocol module could receive a message for which no processing  ... 
doi:10.1109/tcom.1980.1094685 fatcat:jrxd6je3hjgmraifmvyxxcbfke
« Previous Showing results 1 — 15 out of 481,617 results