期刊文献+

多播协议PI演算建模与MWB检测 被引量:1

PI-calculus Modeling of Multicast Protocol Verified with MWB
下载PDF
导出
摘要 MWB是一个基于PI演算的模型检测工具。本文对多播的PIM_SM协议用PI演算建立一个三层模型并进行模型检测,其中主要检测PIM_SM协议中的嫁接和剪枝等;讨论利用PI演算建模的一般方法以及怎样利用MWB工具软件检测模型。 MWB is a model checking tool based on PI-calculus. In this paper we make a three-layered model for the PIM SM protocol of multicast with PI-calculus and verify it, and mainly check the inoculation and pruning in the PIM-SM protocol. We also discuss the technique of PI-calculus modeling and how to use the MWB tool to check models.
作者 张春永 李祥
出处 《计算机工程与科学》 CSCD 2008年第4期30-32,共3页 Computer Engineering & Science
关键词 PI演算 模型检测 多播 PIM_SM 协议 嫁接 剪枝 PI-calculus model checking multicast PIMSM protocol inoculation pruning
  • 相关文献

参考文献6

  • 1Milner R,Parrow J,Walker D. A Calculus of Mobile Processes,Part Ⅰ/Ⅱ[J]. Journal of Information and Computation, 1992:100(1):1477.
  • 2Milner R. The Polyadic π-Calculus: A Tutorial[R]. Technical Report ECS-LFCS-91-180 ,Department of Computer Science, University of Edinburgh, 1991.
  • 3Sangiorgi D. A Theory of Bisimulation for the Pi-Caleulus[C] //Proc of the 4th Int'l Conf on Concurrency Theory, 1993: 127-142.
  • 4Anastasi G, Bartoli A, Spadoni F. Group Multieast in Distributed Mobile Systems with Unreliable Wireless Network[C]//Proe of the 18th IEEE Syrup on Reliable Distributed Systems, 1999.
  • 5Anastasi G,Bartoli A,Spadoni F. A Reliable Multieast Protocol for Distributed Mobile Systems: Design and Evaluation (extended version)[J]. IEEE Trans on Parallel and Distributed Systems, 2001,12(10) : 1009-1022.
  • 6Victor B. The Mobility Workbench User's Guide: Polyadic version 3.122[Z]. Department of Information Technology, Uppsala University, 1995.

同被引文献14

  • 1赵旭宝,罗焕佐,周晓晔,王玉.动态组织重构中的角色模型研究[J].信息与控制,2005,34(1):7-11. 被引量:4
  • 2叶鑫,王延章.电子政务的层次角色网络模型研究[J].系统工程学报,2006,21(2):216-220. 被引量:6
  • 3宋艳,高春鸣.基于移动工作台的BPEL4WS死锁验证[J].计算机工程,2007,33(1):92-94. 被引量:4
  • 4Ye Xin,Yang Xing-kai,Zhu Liming, et al.Research of government horizon business integration management system based on HRNM and agent[C].The IEEE/WIC/ACM International Con- ference on Intelligent Agent Technology,2006:558-561.
  • 5Ye Xin,Niu Guangxin,Dai Zailin.Research on flexible control on dynamic business process in E-government [C]. International Symposium on Information Processing,2008:336-339.
  • 6Niu Guangxin,Ye Xin,Dai Zailin.A Pi-calculus based role net- work model for E-government[C].IEEE International Confe- rence on Information and Automation,2008:1009- 1014.
  • 7Wang Leizhen, Wang Dingwei. A role-based business process modeling methodology[C].Chinese Control and Decision Con- ference,2009:4881-4885.
  • 8Amaud Dury, Sergiy Boroday, Alexandre Petrenko,et al.Formal verification of business workflows and role based access control systems[C].The International Conference on Emerging Security Information,Systems,and Technologies,2007:201-210.
  • 9Aashay Thipse,Rattikom Hewett.Verification of dynamic separa- tion of duty policy for role-based business processes[C].IEEE Region 5 Conference,2008:1-6.
  • 10Basit Shafiq,Ammar Masood,James Joshi,et al.A role-based ac- cess control policy verification framework for real-time systems [C]. 10th IEEE International Workshop on Object-Oriented Real- Time Dependable Systems,2005:13-20.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部