Sciweavers

478 search results - page 15 / 96
» Formal Methods for Specifying, Validating, and Verifying Req...
Sort
View
KBSE
2005
IEEE
15 years 5 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard
TACAS
1998
Springer
81views Algorithms» more  TACAS 1998»
15 years 4 months ago
Formal Design and Analysis of a Gear Controller
In this paper, we report on an application of the validation and veri cation tool kit Uppaal in the design and analysis of a prototype gear controller, carried out in a joint proje...
Magnus Lindahl, Paul Pettersson, Wang Yi
IJCSA
2006
95views more  IJCSA 2006»
14 years 12 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
APSEC
2005
IEEE
15 years 5 months ago
Describing and Verifying Integrated Services of Home Network Systems
This paper presents a framework to specify and verify integrated services of a home network system (HNS). We first develop a modeling language to describe the HNS and the integra...
Pattara Leelaprute, Tatsuhiro Tsuchiya, Tohru Kiku...
FAC
2007
128views more  FAC 2007»
14 years 12 months ago
Verifying a signature architecture: a comparative case study
Abstract. We report on a case study in applying different formal methods to model and verify an architecture for administrating digital signatures. The architecture comprises seve...
David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki...