期刊文献+

多智体系统时态认知规范的模型检测算法 被引量:9

A Model Checking Algorithm for Temporal Logics of Knowledge in Multi-Agent Systems
下载PDF
导出
摘要 模型检测技术一直以来主要是检验用时态逻辑描述的规范,人们很少注意认知逻辑的模型检测问题,而在分布式系统领域,系统和协议的规范已广泛地采用知识逻辑来描述.着重研讨了时态认知逻辑的模型检测算法.在SMV(symbolicmodelverifier)模型检测器的基础上,根据知识的语义和集合理论,提出了多种检验知识和公共知识的算法,从而使SMV的检测功能由时态逻辑扩充到时态认知逻辑.这些方法也适用于其他以状态集合作为输出的模型检测方法和工具的功能扩充. Model checking has being used mainly to check if a system satisfies the specifications expressed in temporal logic and people pay little attention to the model checking problem for logics of knowledge. However, in the distributed systems community, the desirable specifications of systems and protocols have been expressed widely in logics of knowledge. In this paper, the model checking approaches for the temporal logic of knowledge are discussed. On the base of SMV (symbolic model verifier), according to the semantics of knowledge and set theory, several approaches for model checking of knowledge and common knowledge are presented. These approaches make SMV抯 functions extended from temporal logics to temporal logics of knowledge. They also correspond to other model checking approaches and tools where the output is the set of states.
出处 《软件学报》 EI CSCD 北大核心 2004年第7期1012-1020,共9页 Journal of Software
基金 国家自然科学基金 广东省自然科学基金~~
关键词 符号模型检测 多智体系统 协议验证 SMV TMN密码协议 symbolic model checking multi-Agent system verification of protocol SMV TMN cryptographic protocol
  • 相关文献

参考文献1

二级参考文献15

  • 1J Mitchell, M Mitchell, U Stern. Automated analysis of cryptographic protocols using murφ. In: Proc of the IEEE Symp on Security and Privacy. USA:IEEE Computer Society Press, 1997.141~151
  • 2SMV. http:∥www.cs.cmu.edu/~modelcheck/
  • 3Zhang Yuqing, Li Jihong, Xiao Guozhen. An approach to the formal verification of the two-party cryptographic protocols. ACM Operating Systems Review, 1999, 33(4): 48~51
  • 4Zhang Yuqing, Chen Kai, Xiao Guozhen. Automated analysis of cryptographic protocol using SMV. In: Proc of Int'l Workshop on Cryptographic Techniques and E-Commerce (CrypTEC'99). Hong Kong: City University of Hong Kong Press, 1999. 281~285
  • 5M Tatebayashi, N Matsuzaki, D B Newman. Key distribution protocol for digital mobile communication systems. In: Proc of Crypto'89, LNCS vol 435. Berlin: Springer-Verlag, 1990. 324~333
  • 6M Burrows, M Abadi, R Needham. A logic of authentication. ACM Trans on Computer Systems, 1990, 8(1): 18~36
  • 7C Boyd, W Mao. On a Limitation of BAN Logic. In: Advances in Cryptology-EUROCRYPT'93. Berlin: Springer-Verlag, 1993. 240~247
  • 8G Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Proc of TACAS, LNCS vol 1055. Berlin: Springer Verlag, 1996. 147~166
  • 9Z Dang, R Kemmerer. Using the ASTRAL model checker for cryptographic protocol analysis. In: DIMACS Workshop on Design and Formal Verification of Security Protocols. 1997. http:∥dimacs.rutgers.edu/Workshops/Security/program2/program.html
  • 10G Lowe. Towards a completeness result for model checking of security protocols. University of Leicester, Tech Rep: 1998/6,1998. http:∥www.mcs.le.ac.uk/~glowe/Security/Papers/completeness.ps.gz

共引文献4

同被引文献84

引证文献9

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部