Policy Controlled System and Its Model Checking
نویسندگان
چکیده
SUMMARY A policy is an execution rule (or constraint) for objects in a system to retain security and integrity of the system. We introduce a simple policy specification language and define its operational semantics. A new NFA construction algorithm that works in linear time is proposed and a model checking method for policy controlled system (PCS) is presented. We conducted verification of a sample PCS for hotel reservation by our automatic verification tool and the experimental results showed the efficiency of the proposed method.
منابع مشابه
A Hybrid Meta-heuristic Approach to Cope with State Space Explosion in Model Checking Technique for Deadlock Freeness
Model checking is an automatic technique for software verification through which all reachable states are generated from an initial state to finding errors and desirable patterns. In the model checking approach, the behavior and structure of system should be modeled. Graph transformation system is a graphical formal modeling language to specify and model the system. However, modeling of large s...
متن کاملCoastal Water Level Prediction Model Using Adaptive Neuro-fuzzy Inference System
This paper employs Adaptive Neuro-Fuzzy Inference System (ANFIS) to predict water level that leads to flood in coastal areas. ANFIS combines the verbal power of fuzzy logic and numerical power of neural network for its action. Meteorological and astronomical data of Santa Monica, a coastal area in California, U. S. A., were obtained. A portion of the data was used to train the ANFIS network, wh...
متن کاملReachability checking in complex and concurrent software systems using intelligent search methods
Software system verification is an efficient technique for ensuring the correctness of a software product, especially in safety-critical systems in which a small bug may have disastrous consequences. The goal of software verification is to ensure that the product fulfills the requirements. Studies show that the cost of finding and fixing errors in design time is less than finding and fixing the...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملPolicy Time-Inconsistency: A Comparison of Managed Floating Exchange Rate and Controlled Exchange Rate Regimes
Some empirical and theoretical studies have emphasized on fixed exchange rate regime in controlling time inconsistency, while others consider the role of target zone regime as an important factor. Thus there is no general consensus to decide which exchange rate regime may bring about less time-inconsistency. The main purpose of this study is to investigate policy time-inconsistency in exchange ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 88-D شماره
صفحات -
تاریخ انتشار 2005