Viola: A Verifier For Interoperating Components
نویسنده
چکیده
Two or more components (e.g., objects, modules, or programs) interoperate when they exchange data, such as XML data. Currently, there is no approach that can detect a situation at compile time when one component modifies XML data so that it becomes incompatible for use by other components, delaying discovery of errors to runtime. Our solution, a Verifier for Interoperating cOmponents for finding Logic fAults (Viola) builds abstract programs from the source code of components that exchange XML data. Viola symbolically executes these abstract programs thereby obtaining approximate specifications of the data that would be output by these components. The computed and expected specifications are analyzed to find errors in XML data exchanges between components. We describe our approach, implementation, and give our error checking algorithm. We used Viola on open source and commercial systems and discovered errors that were not detected during their design and testing.
منابع مشابه
Convertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملA Review of Viola Odorata use in Persian and Modern Medicine
Introduction: Common viola, scientifically called viola odorata, has had many therapeutic applications since long ago. In Traditional Persian Medicine (TPM) sources, it has a cool and wet nature and is used for different diseases. Due to the low side effects and numerous beneficial effects of violet, this review study was conducted to evaluate Viola Odorata from the Persian medicine sources' pe...
متن کاملDevelopment of an Embedded Verifier for Java Card Byte Code using Formal Methods Ludovic
The Java security policy is implemented using security components such as a Java Virtual Machine (JVM), API, verifier, and a loader. It is of prime importance to ensure that these components are implemented in accordance with their specifications. Formal methods can be used to bring the mathematical proof that their implementation corresponds to their specification. In this paper, we introduce ...
متن کاملاثر عصاره Viola odorata(گل بنفشه) بر میزان بقای رده سلولی MDA-MB-468 سه گانه منفی سرطان سینه
Background and purpose: Recently studies have shown that main compound (Cyclotides) of Viola odorata has an inhibitory effect against proliferation of cancer cells. Also, melatonin reduces size and growth of tumor cells. The main purpose of this study was to compare the inhibitory effect of Viola odorata and melatonin on MDA-MB-468 cells proliferation. Materials and methods: In this exprimental...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005