期刊文献+

多主体系统时态认知规范的“On the Fly”模型检测算法研究 被引量:2

Algorithm Research on “On the Fly” Model Checking Temporal Logics of Knowledge in Multi-Agent Systems
下载PDF
导出
摘要 时态认知逻辑已被广泛应用于分布式系统和协议的规范描述,模型检测时态认知规范已成为一个新的研究领域,因此着重研讨时态认知规范的“OntheFly”模型检测算法·在“OntheFly”模型检测时态逻辑描述规范的基础上,根据自动机理论、深度优先方法和知识的语义,提出了“OntheFly”模型检测时态认知规范的算法,该算法在模型检测带有知识算子的时态规范时,在找到一个反例之前,往往只需构造系统的部分甚至小部分状态空间,从而避免了时态认知规范的模型检测中内存不足和状态爆炸等问题,实现了“OntheFly”模型检测时态认知规范,并且算法的复杂性是多项式时间的·最后,通过该方法在验证TMN密码协议中的应用来作为一个例子说明该方法的有效性· Temporal logics of knowledge have been widely used in the distributed systems community and in the expression for the specifications of protocols. The model checking for temporal logics of knowledge becomes a new and important research domain. So approaches to the "on the fly" model checking the temporal logics of knowledge are discussed. Based on the "on the fly" model checking approaches for temporal logics, and according to automata theory and the semantics of knowledge, the "on the fly" model checking approaches to the temporal logics of knowledge are presented. These approaches, making the model checking for the specifications with knowledge operators, need only to construct a small portion of state space of system before a counterexample is found, and so avoid memory-shortage and state-explosion and realize "on the fly" model checking for the tempora.l logic of knowledge. And the time complexity of the algorithm is polynomial. Finally, the application to the verification of the TMN cryptographic protocol is illustrated to show the effectiveness of the approach.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第8期1417-1424,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60496327 10410638 60473004) 德国科学研究基金项目(446CHV113/240/0-1) 广东省自然科学基金项目(04205407)~~
关键词 自动机 时态认知逻辑 模型检测 多主体系统 协议验证 TMN密码协议 automata temporal logics of knowledge model checking multi-agent system verification of protocol TMN cryptographic protocol
  • 相关文献

参考文献18

  • 1林惠民,张文辉.模型检测:理论、方法与应用[J].电子学报,2002,30(12A):1907-1912. 被引量:163
  • 2Edmund M Clarke, Orna Grumberg, Doron A Peled. Model Checking [M]. Cambridge: MIT Press, 1999
  • 3C Courcoubetis, M Y Vardi, P Wolper, et al. Memory effieient algorithms for verification of temporal properties [J].Formal Methods in System Design, 1992, 1 (2/3) : 275-288
  • 4R Gerth, D Pied, M Y Vardi, et al. Simple on-the-fly automatic verification of linear temporal logic [C]. In: Proc of the 15th IFIP WG6.1 Int'l Symposium on Protocol Specification, Testing and Verification. Warsaw, Poland :Chapman & Hall, 1995. 3-18
  • 5J C Fernandez, C Jard, T Jeron, et al. Using on-the-fly verification techniques for the generation of test suites [C]. The 8th lnt'l Conf on Computer Aided Verification, New Brunswick, New Jersey, 1996
  • 6C Jard, T Jeron. Bounded-memory algorithms for verification on-the-fly [C]. The 3rd Workshop on Computer-Aided Verification, Aalborg, 1991
  • 7van der Meyden, Kaile Su. Symbolic model checking the knowledge of the dining cryptographers [C]. The 17th IEEE Security Foundation Worhshop, Asilomar, 2004
  • 8Kaile Su. Model checking temporal logics of knowledge in distributed systems [C]. The 19th National Conf on Artificial Intelligence (AAAI-04), California, 2004
  • 9吴立军,苏开乐.多智体系统时态认知规范的模型检测算法[J].软件学报,2004,15(7):1012-1020. 被引量:9
  • 10Ron van der Meyden, N V Shilov. Model checking knowledge and time in systems with perfect recall(extended abstract)[ G].In: C C Coos, ed. Foundations of Software Technology and Theoretical Computer Science, LNCS 1738. Berlin: Springer-Verlag, 1999. 432-445

二级参考文献19

  • 1李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 2J Mitchell, M Mitchell, U Stern. Automated analysis of cryptographic protocols using murφ. In: Proc of the IEEE Symp on Security and Privacy. USA:IEEE Computer Society Press, 1997.141~151
  • 3SMV. http:∥www.cs.cmu.edu/~modelcheck/
  • 4Zhang Yuqing, Li Jihong, Xiao Guozhen. An approach to the formal verification of the two-party cryptographic protocols. ACM Operating Systems Review, 1999, 33(4): 48~51
  • 5Zhang Yuqing, Chen Kai, Xiao Guozhen. Automated analysis of cryptographic protocol using SMV. In: Proc of Int'l Workshop on Cryptographic Techniques and E-Commerce (CrypTEC'99). Hong Kong: City University of Hong Kong Press, 1999. 281~285
  • 6M Tatebayashi, N Matsuzaki, D B Newman. Key distribution protocol for digital mobile communication systems. In: Proc of Crypto'89, LNCS vol 435. Berlin: Springer-Verlag, 1990. 324~333
  • 7M Burrows, M Abadi, R Needham. A logic of authentication. ACM Trans on Computer Systems, 1990, 8(1): 18~36
  • 8C Boyd, W Mao. On a Limitation of BAN Logic. In: Advances in Cryptology-EUROCRYPT'93. Berlin: Springer-Verlag, 1993. 240~247
  • 9G Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Proc of TACAS, LNCS vol 1055. Berlin: Springer Verlag, 1996. 147~166
  • 10Z Dang, R Kemmerer. Using the ASTRAL model checker for cryptographic protocol analysis. In: DIMACS Workshop on Design and Formal Verification of Security Protocols. 1997. http:∥dimacs.rutgers.edu/Workshops/Security/program2/program.html

共引文献180

同被引文献17

  • 1吴立军,苏开乐.多智体系统时态认知规范的模型检测算法[J].软件学报,2004,15(7):1012-1020. 被引量:9
  • 2SUKaile LüGuanfeng CHENQingliang.Knowledge structure approach to verification of authentication protocols[J].Science in China(Series F),2005,48(4):513-532. 被引量:4
  • 3贾国平,郑国梁.基于软件工程的规约方法分类[J].软件,1995,16(7):4-10. 被引量:1
  • 4苏开乐,骆翔宇,吕关锋.符号化模型检测CTL[J].计算机学报,2005,28(11):1798-1806. 被引量:24
  • 5Mcmillan K L.Symbolic model checking:1020 states and be-yond[J].Information and Computation,1992,98(2):142-170
  • 6Holzmann G.Design and Validation of Computer Protocols[M].Prentice Hall,1990
  • 7Holzmann G.The model checker spin[J].IEEE Trans.on Software Engineering,1997,23(5):279-295
  • 8van der Hock W,Wooldridge M.Model checking knowledge and time[C]///Stefan Leue C C,ed.Proc.of the 9th Int'1 Spin.Workshop on Model Checking of Software.Bedin,Springer-Verlag,2002:1-16
  • 9Emerson E A,Lei Chin-laung.Modalities for model checking (extended abstract):Branching time strikes back[C] //Proceedings of the 12th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages.New York,1985:84-96
  • 10Clarke E M,Emerson E A.Design and synthesis of synchronization skeletons using branching-time temporal logic[C] // Proceedings of Logic of Programs Workshop.Yorktown Heights,New York,1981:52-71

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部