A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
On Quantitative Analysis of Probabilistic Protocols
2005
Electronical Notes in Theoretical Computer Science
We illustrate this approach by presenting the analysis of a probabilistic nonrepudiation protocol which allows us to quantitatively estimate its fairness degree. ...
We advocate the use of approximate noninterference for the security analysis of probabilistic protocols. ...
The quantitative analysis is based on a notion of process similarity corresponding to an approximate version of the weak probabilistic bisimulation semantics [5] . ...
doi:10.1016/j.entcs.2004.01.019
fatcat:3tas464iwjhonbwdstleap4uiq
MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis
[chapter]
2012
Lecture Notes in Computer Science
We perform statistical quantitative analysis based on repeated discrete-event simulations in Maude. ...
The probabilistic, declarative model is not used to select transition rules, but to stochastically capture the result of applying rules. ...
Using Maude to simulate the basic behavior of models given as probabilistic rewrite theories, we apply a statistical quantitative analysis method based on discreteevent simulation, in order to obtain numerical ...
doi:10.1007/978-3-642-30729-4_11
fatcat:ub5pmwmdwvfnhnrp2u6mhb4ycm
A Quantitative Analysis of Collision Resolution Protocol for Wireless Sensor Network
2015
Journal of Software Engineering and Applications
We formalize collision resolution protocol as a Markov Decision Process to express each node behavior and perform quantitative analysis using probabilistic model checker PRISM. ...
In this paper, we present formal analysis of 2CS-WSN collision resolution protocol for wireless sensor networks using probabilistic model checking. ...
Quantitative Analysis We now proceed to quantitative analysis of 2CS-WSN protocol. ...
doi:10.4236/jsea.2015.88036
fatcat:4xrkobkcxbazjbtlngtec6g4lm
Quantitative model checking of an RSA-based email protocol on mobile devices
2011
2011 IEEE Symposium on Computers and Communications (ISCC)
The proposed study employs formal analysis techniques, such as probabilistic model checking, and proceeds to a quantitative analysis of the email protocol, taking into account computational parameters ...
To the best of our knowledge, this is the first time that probabilistic model checking is utilized towards verifying a secure e-mail protocol under hardware constrains. ...
This fact makes probabilistic model checking a promising approach towards quantitative analysis of protocols [8] , [17] . ...
doi:10.1109/iscc.2011.5983911
dblp:conf/iscc/PetridouBAPK11
fatcat:oyqlblag6vftlmpwkrhrxi3s5a
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
2008
2008 32nd Annual IEEE International Computer Software and Applications Conference
The proposed analysis is based on a probabilistic attacker model implementing simultaneous N zombie participants, which subvert secure authentication features in communication protocols and electronic ...
The overall analysis takes place in a mature probabilistic model checking toolset called PRISM. ...
tests, to check on the generated sample if the quantitative property of interest is satisfied. ...
doi:10.1109/compsac.2008.48
dblp:conf/compsac/BasagiannisKPA08
fatcat:quxefjhemvgv3cvtullttrrge4
Guest editors' introduction: Special issue on Probabilistic Techniques for the Design and Analysis of Systems
2003
The Journal of Logic and Algebraic Programming
In recent years, we have seen much progress in the specification, modeling and analysis of probabilistic behaviour. ...
But in real-life systems not only functionality but also quantitative aspects of system behaviour are important. ...
In recent years, we have seen much progress in the specification, modeling and analysis of probabilistic behaviour. ...
doi:10.1016/s1567-8326(02)00064-4
fatcat:54tmit7fbjdbjngagab2wulsge
LiQuor: A tool for Qualitative and Quantitative Linear Time analysis of Reactive Systems
2006
Third International Conference on the Quantitative Evaluation of Systems - (QEST'06)
LiQuor provides the facility to perform a qualitative or quantitative analysis for ω-regular linear time properties by means of automata-based model checking algorithms. ...
LiQuor is a tool for verifying probabilistic reactive systems modelled Probmela programs, which are terms of a probabilistic guarded command language with an operational semantics based on (finite) Markov ...
The model checking tool LiQuor, short for "Linear time Qualitative/Quantitative analysis of reactive systems", serves to compute minimal or maximal probabilities for ω-regular path-properties of a probabilistic ...
doi:10.1109/qest.2006.25
dblp:conf/qest/CiesinskiB06
fatcat:swnlggsb6jekzluvatprodl5ou
PRISM: A Tool for Automatic Verification of Probabilistic Systems
[chapter]
2006
Lecture Notes in Computer Science
Probabilistic model checking is an automatic formal verification technique for analysing quantitative properties of systems which exhibit stochastic behaviour. ...
PRISM is a probabilistic model checking tool which has already been successfully deployed in a wide range of application domains, from real-time communication protocols to biological signalling pathways ...
Overview Probabilistic model checking is an automatic formal verification technique for the analysis of systems which exhibit stochastic behaviour. ...
doi:10.1007/11691372_29
fatcat:qksgy2exbnhnfao2vxq75l6j5q
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol
2009
Electronical Notes in Theoretical Computer Science
Due to the probabilistic nature of the protocol and its underlying attacker model, it is intrinsically difficult to build a faithful model of the protocol with which one may automatically verify its properties ...
through automated statistical quantitative model checking analysis techniques. ...
On the other, formal analysis results like those presented here should then be obtained for a variety of underlying protocols of interest. ...
doi:10.1016/j.entcs.2009.02.069
fatcat:s4gwkp6dgnfstgoragirdopxwm
Redesign of the LMST Wireless Sensor Protocol through Formal Modeling and Statistical Model Checking
[chapter]
2008
Lecture Notes in Computer Science
On the one hand, it is infeasible to comprehensively evaluate an ad-hoc wireless sensor network protocol based solely on deployment in the field. ...
This serves as our base specification and provides key infrastructure on which to tackle the important challenge of arriving at a realistic (re-)design of the LMST protocol. ...
Correctness results, based on quantitative statistical analysis of our new design, are given in Figure 2c . ...
doi:10.1007/978-3-540-68863-1_10
fatcat:lrsyxbkwovhj3iasn37mxp5bs4
Quantitative analysis for authentication of low-cost RFID tags
2011
2011 IEEE 36th Conference on Local Computer Networks
In this work, we launch a quantitative verification analysis for the low- cost Radio Frequency Identification (RFID) protocol proposed by Song and Mitchell. ...
Formal analysis techniques are widely used today in order to verify and analyze communication protocols. ...
To the best of our knowledge, this is the first research effort that performs a quantitative analysis of an RFID protocol using probabilistic model checking.
II. ...
doi:10.1109/lcn.2011.6115307
dblp:conf/lcn/PaparrizosBP11
fatcat:xlikii76c5emndafyay2vayalm
Advances in Quantitative Verification for Ubiquitous Computing
[chapter]
2013
Lecture Notes in Computer Science
− need to consider sensor noise, hence motion primitives may
have probabilistic outcomes
− assume simplified setting of perfect information (achievable
with RFID tags)
• Quantitative analysis ...
PRISM
Automatic verification (aka model checking) of quantitative
properties of probabilistic system models
Why quantitative verification? ...
doi:10.1007/978-3-642-39718-9_3
fatcat:emkb7jqcurg37nhkdyeel6icma
Quantitative Aspects of Programming Languages and Systems over the past 2^4 years and beyond
2020
Electronic Proceedings in Theoretical Computer Science
In the same period, they represented the central theme of the series of workshops entitled Quantitative Aspects of Programming Languages and Systems (QAPL) and born in 2001. ...
Quantitative aspects of computation are related to the use of both physical and mathematical quantities, including time, performance metrics, probability, and measures for reliability and security. ...
of Quantum Protocols using MCMAS. ...
doi:10.4204/eptcs.312.1
fatcat:4fjvygbppjbq3k5ury2kvue3nq
Advances and challenges of probabilistic model checking
2010
2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton)
Probabilistic model checking is a powerful technique for formally verifying quantitative properties of systems that exhibit stochastic behaviour. ...
distributed protocols. ...
PROBABILISTIC MODEL CHECKING & PRISM Probabilistic model checking is based on the construction and analysis of a probabilistic model. ...
doi:10.1109/allerton.2010.5707120
fatcat:bauounyehvelpe4dwjrobeugfe
Quantitative Analysis of a Probabilistic Non-repudiation Protocol through Model Checking
[chapter]
2009
Lecture Notes in Computer Science
This probability indicates the degree of fairness of the protocol and is referred as -fairness. In this paper, we analyze the protocol quantitatively through probabilistic model checking. ...
the reverse question, given the degree of fairness , how should one choose the protocol parameters to ensure fairness. ...
Modeling and Analysis of Probabilistic Non-Repudiation Protocol We carry out our analysis of the non-repudiation protocol by probabilistic model checker PRISM [3] . ...
doi:10.1007/978-3-642-10772-6_22
fatcat:z5sfdf4oazao5i6s3e42h2ogci
« Previous
Showing results 1 — 15 out of 42,293 results