-
1
-
2
Towards Sophisticated Air Traffic Control System Using Formal Methods
Published 2018-01-01“…In such a critical safety system, the use of robust formal methods that assure bugs absence is highly required. …”
Get full text
Article -
3
State-of-the-art survey of smart contract verification based on formal methods
Published 2022-08-01Subjects: Get full text
Article -
4
An Innovative Approach for Modelling Urban Road Traffic Using Timed Automata and Formal Methods
Published 2018-01-01Get full text
Article -
5
Researches on role-based middleware in wireless sensor networks
Published 2011-01-01Subjects: Get full text
Article -
6
Theoretical problems of component-based structural synthesis
Published 2005-12-01Subjects: Get full text
Article -
7
Research on formal description and verification of automated trust negotiation
Published 2011-01-01Subjects: Get full text
Article -
8
Improvement and formal proof on protocol Otway-Rees
Published 2012-09-01Subjects: Get full text
Article -
9
Research on Web service discovery based on user community relations
Published 2015-10-01Subjects: Get full text
Article -
10
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: Get full text
Article -
11
Extended-CSP based analysis of non-repudiation protocols
Published 2008-01-01Subjects: Get full text
Article -
12
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01Subjects: Get full text
Article -
13
A Formal Approach to Road Safety Assessment Using Traffic Conflict Techniques
Published 2024-01-01“…As such, formal methods provide a novel way to model traffic rules and verify road users' compliance. …”
Get full text
Article -
14
Design, implementation and formal verification of BGP proxy for mimic router
Published 2023-03-01“…To ensure the safety and correctness of the critical ‘mimic bracket’ components such as protocol proxies of mimic routers, a BGP (border gateway protocol) proxy was designed and implemented, and formal methods were applied to verify the safety and correctness of the BGP proxy.The BGP packets communicated between the peer routers and the master actor were monitored by the BGP proxy.The BGP sessions with the slave actors on behalf of peer routers were established, ensuring the consistency of the BGP protocol states for all actors.The formal specification of the BGP proxy was written based on separation logic.The VeriFast theorem prover was used to prove that the program had no memory safety problems such as null pointer reference.Furthermore, the formal verification of high-level attributes of each module in BGP proxy was also conducted to strictly ensure that the implementation met the specification.The implementation to proof code ratio of BGP proxy is about 1.8:1, and the implementation to proof labor hour ratio is about 1:3.The formally verified BGP proxy consume 0.16 seconds to process 100 000 BGP routes, which is about 7 times as long as the unverified one.Works done provide a reference for applying formal methods to verify the safety and correctness of critical components in mimic defense equipment and systems.…”
Get full text
Article -
15
Teologia wśród nauk formalnych. Uwagi polemiczne do artykułu Krzysztofa Jaworskiego
Published 2025-01-01“…The author also addresses Jaworski’s objections and points to the need for a more precise definition of his earlier position, emphasizing the importance of formal methods and rules of text transformation in theology.…”
Get full text
Article -
16
Décomposer les humanités numériques
Published 2020-01-01“…More importantly, though, it increasingly becomes a liability in the context of the progressive institutionalisation of the digital humanities.Rather than vainly trying to find a definition of digital humanities that is at the same time descriptive and rigorous, we propose a stipulative definition that separates them into theoretical and applied digital humanities: the theoretical digital humanities are the metascientific discipline whose goal is the conception of formal methods that the applied digital humanities use to create formal models in the various humanities disciplines.…”
Get full text
Article -
17
System of systems method and formal function decomposition for software systems
Published 2010-01-01“…Based on the theory and method of system of system(SoS),the research work for the formal functional de-composition and estimation of large scale and open software systems was described,which were often emerged in IOT(internet of things) and cloud computing environments.It was proposed that abstraction description was necessary for the SoS properties of a large scale and open software system.Based on system abstract,formal methods for functional decomposition and estimation were described.The applications of the methods in system development and stable inter-mediate form building were discussed.The methods proposed here are helpful for improving the processes of implemen-tation,deployment and maintenance of large scale and open software systems in IOT and cloud computing environments.…”
Get full text
Article -
18
Analysis for e-commerce protocols based on ProVerif
Published 2009-01-01“…It was very important to analyze e-commerce protocols by formal methods.A technique for modeling the fair-change e-commerce protocol(FEEP) with automated dispute resolution and for verifying its property was proposed.First, FEEP was modeled in applied picalculus and a novel formalization of the fairness was provided in term of a correspondence property.Then, ProVerif, proposed by Juels, Catalano and Jakobsson, was adopted to analyze FEEP automatically.The results show that:it is feasible to formalize the fairness based on a correspondence property;ProVerif can be used to verify the property that before event A happened, event B had happened, but it is not applicable to analyze the property that after event A happened, event B would happen.…”
Get full text
Article -
19
Analysis and improvement of the BACnet/IP based on identity authentication
Published 2024-03-01“…To solve security issues arising from multiple attackable vulnerabilities and key leakage in BACnet/IP authentication, a security-enhanced BACnet/IP-SA protocol authentication scheme was proposed.By analyzing the authentication message flow model of the protocol and modeling it using colored Petri net theory and CPN Tools, vulnerabilities in the security of BACnet/IP were identified.An improvement scheme was proposed based on the Dolev-Yao attacker model and formal analysis method.The BACnet/IP-SA protocol utilized the device’s pseudo-identity to safeguard the actual identity information.It emploied the PUF response for authentication and verified the authenticity of the counterparty’s identity.The session key was generated through the authentication value of the multi-information set.The protocol’s security was demonstrated by combining BAN logic and non-formal methods.The experimental results indicate that the proposed scheme can effectively resist security threats from multi-class attacks and key leakage, enhancing the security of the protocol authentication while reducing computational overhead.…”
Get full text
Article -
20
Formal Verification of Multi-Thread Minimax Behavior Using mCRL2 in the Connect 4
Published 2024-12-01“…The findings highlight the value of formal methods in validating the correctness of parallel artificial intelligence algorithms, laying the foundation for future optimizations that focus on performance.…”
Get full text
Article