Formal Specification and Verification for SQL Operations in Top Level Specification of a Secure Database
نویسندگان
چکیده
Formal specification and verification is required for high security level DBMS in the top level specification design. The specification and verification towards SQL operations is important especially. In this paper, we propose a novel approach to solve the specification and verification issues towards SQL operations. Firstly, we formally define the SQL operations in FTLS; then, we give the definitions of the simple SQL operations and propose a method to verify them; finally, we transform the verification of the SQL operations in FTLS to the verification of the component simple SQL operations. The process of verification shows that our approach makes a comprehensive specification of SQL operations and simplifies the verification procedure.
منابع مشابه
Web Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملFormal Method in Service Composition in Heath Care Systems
One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verificati...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملModelling Real-time Database Systems in Duration Calculus
In this paper, we give a formal model for real-time database systems using Duration Calculus. Our model supports the formal reasoning about the operations in the systems. As a case study for our technique, we give a formal specification and verification of the Read/Write Priority Ceiling Protocol (R/WPCP).
متن کامل