Sixth International Conference on Application of Concurrency to System Design (ACSD'06)
DOI: 10.1109/acsd.2006.29
|View full text |Cite
|
Sign up to set email alerts
|

Specification and Verification of Dynamic Communication Systems

Abstract: Dynamic communication systems (DCS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
1

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 28 publications
(31 reference statements)
0
15
1
Order By: Relevance
“…The value of an integrated methodology for specifying and verifying network protocols has long been recognized [5] and research continues for today's protocols [6]. The methodology advocated in this thesis defines an analogous tool set to that described above for the composition of layered network simulations.…”
Section: Chapter II Toolsmentioning
confidence: 99%
“…The value of an integrated methodology for specifying and verifying network protocols has long been recognized [5] and research continues for today's protocols [6]. The methodology advocated in this thesis defines an analogous tool set to that described above for the composition of layered network simulations.…”
Section: Chapter II Toolsmentioning
confidence: 99%
“…It is also possible to model "dynamic access control" by other methods such as using pushdown systems [40], graph grammars [5], or frameworks such as "formal concept analysis and concept lattices" [21] but we will only discuss the access control problem on the Internet that can be modelled using pushdown systems. …”
Section: "Dynamic" Access Controlmentioning
confidence: 99%
“…In this work, we elaborate on an automated procedure for checking whether a DCS protocol satisfies a given Mett property. A manual procedure was briefly sketched in [3]. By bridging the technical gap between different analysis techniques with different strengths and weaknesses, we obtain a fully automated, integrated implementation, which benefits from synergetical effects.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, there are neither process creation, destruction, nor evolving communication topologies. In fact, in preliminary work [3], we manually discovered (and remedied) severe flaws in the original specification. With our proposed technique we are able to do so automatically.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation