期刊文献+

协议自动验证的可靠策略 被引量:1

RELIABLE STRATEGY FOR AUTOMATED PROTOCOL VALIDATION
下载PDF
导出
摘要 本文在分析现有验证技术的基础上,提出了实体自动机化简方法和错误优先的搜索算法(EFSA),同时介绍了根据上述策略建立的以ESTELLE为描述模型的协议自动验证系统APVS. After Analyzing existing protocol validation techniques, we propose a FSM simplified method and an error-first search algorithm. Based on this strategy,an automated protocol validation system (APVS) in which protocols are specified in ESTELLE is developed and discussed.
出处 《软件学报》 EI CSCD 北大核心 1993年第5期38-45,共8页 Journal of Software
基金 国家教委博士点基金资助
  • 相关文献

参考文献3

  • 1Liu M T,1989年
  • 2Chung A,1988年
  • 3Chow C H

同被引文献10

  • 1Burch J R,Clarke E M,McMillan K Let al.Symbolic model checking:1020 states and beyond[J].Information Computation,1992;98(2): 142-170.
  • 2Ralph D Jeffords,Constance L Heitmeyer.A Strategy for Efficiently Verifying Requirements Specifications Using Composition and Invariants Software Noets ACM.
  • 3G J Holzmann.The model checker SPIN[J].IEEE Transactions on Software Engineering, 1997 ; 23 (5) : 279-295.
  • 4R Jeffords,C Heitmeyer.Automatic generation of state invariants form requirements specifications[C].In:Proc Sixth ACM SIGSOFT Syrup on Foundations of Software Engineering, 1998-11.
  • 5Z Manna,A PnuelLTemporal Verification of Reactive Systems:Safety[M]. Springer-Verlag,New York ,NY, 1995.
  • 6K L McMillan.A methodology for hardware verification using compositional model checkin[J].Science of Comput Prog,2000 ;37 ;279-309.
  • 7C Heimeyer.software Cost Reduction[C].In:J J Marciniak ed.Encyclopedia of Software Engineering.second edition,John Wiley &Sons, Inc,New York ,NY,2002.
  • 8R Jeffords,C Heitmeyer.Automatic generation of state invariants form requirements specitlcations[C].In:Proc Sixth ACM SIGSOFT Syrup on Foundations of Software Engineering, 1998-11.
  • 9R D Jeffords,C L Heitmeyer.An algorithm for strengthening state invariants generated from requirements specifications[C].In:Proc of the Fifth IEEE International Symposium on Requirements Engineering, 2001-08.
  • 10郭云川,古天龙,董荣胜,李凤英.Kerberos协议安全性的符号模型检验分析[J].计算机工程与应用,2003,39(29):177-180. 被引量:3

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部