2018
DOI: 10.1504/ijes.2018.095754
|View full text |Cite
|
Sign up to set email alerts
|

Petri net-based verification of security protocol implementation in software evolution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The correlation matrix is calculated mathematically after classifying and analyzing the types of attacks. The concept of model-driven security validation was explored by literature [21] through software development and behavioral analysis, and the results confirmed the feasibility of the scheme. Literature [22] designed an integrated approach that seamlessly combines security slicing with hybrid constraint solving to detect vulnerabilities developed in open source components, and numerical detection through simulation confirms that the approach can effectively and accurately detect vulnerabilities.…”
Section: Introductionmentioning
confidence: 77%
“…The correlation matrix is calculated mathematically after classifying and analyzing the types of attacks. The concept of model-driven security validation was explored by literature [21] through software development and behavioral analysis, and the results confirmed the feasibility of the scheme. Literature [22] designed an integrated approach that seamlessly combines security slicing with hybrid constraint solving to detect vulnerabilities developed in open source components, and numerical detection through simulation confirms that the approach can effectively and accurately detect vulnerabilities.…”
Section: Introductionmentioning
confidence: 77%
“…And a usable tool, CPN Tools [25], can be used for CPN modelling, simulation, and model checking analysis. Petri net and its extension are widely used in software design and management [26], workflow analysis [27,28], modelling analysis [29,30], fault diagnosis, and protocol verification [31,32]. Additionally, the CPN can provide technical support for error detection by model checking.…”
Section: Related Workmentioning
confidence: 99%