Modeling and Analysis of Security Protocols Using Colored Petri Nets Yang Xu and Xiaoyao Xie COTS and Design Pattern Based High Fidelity Flight Simulator Prototype System

نویسندگان

  • Qihai Zhou
  • Zhongjun Li
  • Shuai Wang
  • Yindong Ji
  • Shupeng Zheng
  • Shutao Zheng
  • Yongmei Li
  • Jingli Zhou
  • Xuejun Nie
  • Leihua Qin
  • Mingtian Zhou
  • Guojun Yang
  • Ying Zheng
  • Gang Wang
  • Ruiliang Yang
  • Yide Zhou
  • Nannan Zhao
  • Lina Gong
  • Lijuan Zhou
  • Haijun Geng
  • Weibing Peng
چکیده

SPECIAL ISSUE PAPERS A Micro-Kernel Test Engine for Automatic Test System Shuai Wang, Yindong Ji, and Shiyuan Yang Research on Algorithm for Consistent Fit or Unfit Sorting Sector and Match Measurement between Plan and Environment Qihai Zhou and Yan Li Modeling and Analysis of Security Protocols Using Colored Petri Nets Yang Xu and Xiaoyao Xie COTS and Design Pattern Based High Fidelity Flight Simulator Prototype System Shupeng Zheng, Shutao Zheng, and Junwei Han A Quasi-Newton Population Migration Algorithm for Solving Systems of Nonlinear Equations Hongxia Liu, Yongquan Zhou, and Yongmei Li The Impact Mechanism of Consumer-generated Comments of Shopping Sites on Consumer Trust Hui Chen Research on Ordinal Properties in Combinatorics Coding Method Jun Lu, Tong Wang, and Daxin Liu Web Clustering Based On Tag Set Similarity Jingli Zhou, Xuejun Nie, Leihua Qin, and Jianfeng Zhu An Approach about Simulation Physics Experiments and Instructional Applications Yuncheng Li Research on the Website

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modeling and Analysis of Security Protocols Using Colored Petri Nets

Security protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design security protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, the current main analysis techniques using Colored Petri Nets (CP-Nets) for analysis of security protocols are ...

متن کامل

Modeling and Analysis of Electronic Commerce Protocols Using Colored Petri Nets

Electronic commerce protocols are the basis of security in electronic commerce. Therefore, it is essential to ensure these protocols correctly. With the ideas of ZQ logic and the security protocols analysis method using Colored Petri Nets, a new method synthesizing ZQ logic and Colored Petri Nets is presented to analyze electronic commerce protocols. The new method is suitable for analyzing bot...

متن کامل

COTS and Design Pattern Based High Fidelity Flight Simulator Prototype System

Flight simulator is among the most sophisticated software systems in existence. It is highly distributed, has rigorous timing requirements, and must be amenable to frequent updates to maintain high fidelity with the everchanging vehicle and environment it is simulating. Current flight simulation framework and software developing pattern are complicated to use and time consuming. We have accompl...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010