期刊文献+

时间自动机与网络协议验证 被引量:1

Timed Automata and Network Protocol Verification
下载PDF
导出
摘要 随着网络协议复杂性的增大,其自身的潜在错误变得更加重要。使用形式化的方法来描述和验证网络协议可以发现其中的潜在错误。时间自动机是形式化方法的一种,可以很好地应用于网络协议验证中。目前基于时间自动机已经开发出了多种自动验证工具。文章介绍了网络协议验证的几种方法,并以KRONOS验证FDDI协议为例说明了用时间自动机验证协议的方法。 The protocol complexity is increasing rapidly, it is important to discover the faulty in protocols. There are many verification methods for protocols. Timed automata can also be applied in protocol verifications very well. Many tools have been developed based on timed automata. They are very useful in protocol verifications. This paper presents some methods of protocol verification and uses KRONOS to verily FDDI to introduce the method of using timed automata.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第22期130-132,共3页 Computer Engineering
关键词 时间自动机 网络协议 阱议验证 Timed automata Network protocol Protocol verification
  • 相关文献

参考文献6

二级参考文献28

  • 1李腊元.基于Z的协议形式描述与验证[J].计算机科学,1994,21(6):11-15. 被引量:3
  • 2R W Cleaveland,P Lewis,S Smolka et al.The concurrency factory:a development environment for concurrent systems[C].In:Alur and Henzinger[6], 398~401 被引量:1
  • 3R W Cleaveland,S Sims.The NCSU concurrency workbench[C].In:Alur and Henzinger[6] ,394~397 被引量:1
  • 4J Yang,A Mok,F Wang. Symbolic model checking for event-driven real-time systems[C].In:IEEE Real-Time Systems Symposium,IEEE Computer Society Press, 1993 被引量:1
  • 5Alur C Coureoubetis,D L Dill.Model-checking for real-time systems[C].In:Proceedings of the 5th Annual Symposium on Logic in Computer Science,IEEE Computer Society Press,1990:414~425 被引量:1
  • 6David L Dill.timing assumptions and verification of finite-state concurrent systems[C].In:J Sifakis ed. Proceedings of the international Workshop on Automatic Verification Methods for Finite State Systems,LNCS 407,1989:197~212 被引量:1
  • 7D Dolev,A Yao. On the security of Public Key Protocols[J].IEEE Transaction on information Theory, 1989;29(2): 198~208 被引量:1
  • 8G Lowe .Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR[C].In:Proceedings of TACAS,LNCS 1055,SpringerVerlag, 1996:147~166 被引量:1
  • 9S Lu,S Smolka. Model checking the Secure Electronic Transaction (SET)Protocol[C].In:Proceedings of the Seventh International Symposium on Modeling,Analysis and simulation of Computer and Telecommunication Systems, 1999 被引量:1
  • 10M Benerecetti,F Giunchiglia. Model Checking Security Protocols Using a Logic of Belief[C].In:TACAS,2000:519~534 被引量:1

共引文献9

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部