Verification of flow control protocols

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

Verification of Control Flow based Security Properties

A fundamental problem in software-based security is whether local security checks inserted into the code are sufficient to implement a global security property. We introduce a formalism based on a two-level lineartime temporal logic for specifying global security properties pertaining to the control-flow of the program, and illustrate its expressive power with a number of existing properties. W...

متن کامل

Performance Bounds for Flow Control Protocols 1

In this paper, we discuss a simple conceptual framework for analyzing the ow of data in integrated services networks. The framework allows us to easily model and analyze the behavior of open loop, rate based ow control protocols, as well as closed loop, window based ow control protocols. Central to the framework is the concept of a service curve element, whose departure process is bounded betwe...

متن کامل

Verification of Parameterized Protocols

Recently there has been much interest in the automatic and semi-automatic veri cation of parameterized networks, i.e., veri cation of a family of systems fPi j i 2 !g, where each Pi is a network consisting of i processes. In this paper, we present a method for the veri cation of so-called universal properties of fair parameterized networks of similar processes, that is, properties of the form 8...

متن کامل

Verification of Security Protocols

ing nonces by constants, an unbounded execution of the NeedhamSchroeder protocol can be represented by the following set CNS of clauses: ⇒ I(enca(〈na, a〉, pub(i))) I(enca(〈x, a〉, pub(b))) ⇒ I(enca(〈x, nb〉, pub(a))) I(enca(〈na, y〉, pub(a))) ⇒ I(enca(y, pub(i))) For simplicity, we have only described the clauses corresponding to the case where A starts sessions with a corrupted agent I and B is w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM SIGCOMM Computer Communication Review

سال: 1985

ISSN: 0146-4833

DOI: 10.1145/1040124.1040125