Дисертації з теми "Model-based protocol"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-36 дисертацій для дослідження на тему "Model-based protocol".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Blom, Johan. "Model-Based Protocol Testing in an Erlang Environment." Doctoral thesis, Uppsala universitet, Avdelningen för datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-279489.
Повний текст джерелаDe, Wet Nico. "Model driven communication protocol engineering and simulation based performance analysis using UML 2.0." Master's thesis, University of Cape Town, 2004. http://hdl.handle.net/11427/6392.
Повний текст джерелаThe automated functional and performance analysis of communication systems specified with some Formal Description Technique has long been the goal of telecommunication engineers. In the past SDL and Petri nets have been the most popular FDT's for the purpose. With the growth in popularity of UML the most obvious question to ask is whether one can translate one or more UML diagrams describing a system to a performance model. Until the advent of UML 2.0, that has been an impossible task since the semantics were not clear. Even though the UML semantics are still not clear for the purpose, with UML 2.0 now released and using ITU recommendation Z.109, we describe in this dissertation a methodology and tool called proSPEX (protocol Software Performance Engineering using XMI), for the design and performance analysis of communication protocols specified with UML.
Laxmi, Vijaya. "Trust based QOS-aware packet forwarding model for ad hoc network independent of routing protocol." Thesis, Wichita State University, 2010. http://hdl.handle.net/10057/3732.
Повний текст джерелаThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
Santiago, Pinazo Sonia. "Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA." Doctoral thesis, Universitat Politècnica de València, 2015. http://hdl.handle.net/10251/48527.
Повний текст джерелаSantiago Pinazo, S. (2015). Advanced Features in Protocol Verification: Theory, Properties, and Efficiency in Maude-NPA [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/48527
TESIS
Nguyen, Ngo Minh Thang. "Test case generation for Symbolic Distributed System Models : Application to Trickle based IoT Protocol." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLC092.
Повний текст джерелаDistributed systems are composed of many distant subsystems. In order to achieve a common task, subsystems communicate both with the local environment by external messages and with other subsystems by internal messages through a communication network. In practice, distributed systems are likely to reveal many kinds of errors, so that we need to test them before reaching a certain level of confidence in them. However, testing distributed systems is complicated due to their intrinsic characteristics. Without global clocks, subsystems cannot synchronize messages, leading to non-deterministic situations.Model-Based Testing (MBT) aims at checking whether the behavior of a system under test (SUT) is consistent with its model, specifying expected behaviors. MBT is useful for two main steps: test case generation and verdict computation. In this thesis, we are mainly interested in the generation of test cases for distributed systems.To specify the desired behaviors, we use Timed Input Output Symbolic Transition Systems (TIOSTS), provided with symbolic execution techniques to derive behaviors of the distributed system. Moreover, we assume that in addition to external messages, a local test case observes internal messages received and sent by the co-localized subsystem. Our testing framework includes several steps: selecting a global test purpose using symbolic execution on the global system, projecting the global test purpose to obtain a local test purpose per subsystem, deriving unitary test case per subsystem. Then, test execution consists of executing local test cases by submitting data compatible following a local test purpose and computing a test verdict on the fly. Finally, we apply our testing framework to a case study issued from a protocol popular in the context of IoT
Kuppusamy, Lakshmi Devi. "Modelling client puzzles and denial-of-service resistant protocols." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61032/1/Lakshmi_Kuppusamy_Thesis.pdf.
Повний текст джерелаRowden, Elizabeth Szydlo. "Response to Intervention: A Case Study Documenting one Elementary School's Successful Implementation." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97953.
Повний текст джерелаDoctor of Education
As schools continue to face increasing demands, including how to meet the needs of students with diverse academic backgrounds, they have been charged with exploring new ways and methods of ensuring that students are successful in their attempts to access the general education curriculum. Response to Intervention, more commonly referred to as RTI, has become more widely used in school systems as they continue to work to ensure student success for all. RTI is seen as a tool to help accurately identify students who have a learning disability (Ciolfi and Ryan, 2011), however more research is needed in order to have a better understanding of how schools implement RTI, as well as how they utilize the data collected and monitor student progress. This qualitative case study analyzes how one subject elementary school implemented RTI, how they utilized data, as well as how they monitored the progress of their students.
Riese, Marc. "Model-based diagnosis of communication protocols /." [S.l.] : [s.n.], 1993. http://library.epfl.ch/theses/?nr=1173.
Повний текст джерелаPinheiro, Pedro Victor Pontes. "Teste baseado em modelos para serviços RESTful usando máquinas de estados de protocolos UML." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-14072014-165410/.
Повний текст джерелаService Oriented Architecture (SOA) is an architectural style consisting of a set of restrictions aimed at promoting the scalability and flexibility of a system, providing its functionalities as services. In recent years, an alternative style was proposed and widely adopted, which designs the system\'s functionalities as resources. This resource oriented architectural style is called REST. In general, the test of web services has several challenges due to its distributed nature, unreliable communication channel, low coupling and the lack of a user interface. Testing RESTful web services (services that use REST) share these same challenges and also need to obey the REST constraints. These challenges require a more systematic and formal testing approach. In this context, model based testing presents itself as a viable process for addressing those needs. The model that represents the system should be simple and precise enough to generate quality test cases. Based on this context, this work proposes a model based approach to test RESTful web services. The behavioral model used was the UML protocol state machine, which is capable to provide a formalization of the service interface, while hiding its internal behaviour. A tool was developed to automatically generate test cases using the state and transition coverage criteria to traverse the model
Ponge, Julien Nicolas Computer Science & Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions." Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.
Повний текст джерелаGorantla, Malakondayya Choudary. "Design and analysis of group key exchange protocols." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37664/1/Malakondayya_Gorantla_Thesis.pdf.
Повний текст джерелаLippold, Georg. "Encryption schemes and key exchange protocols in the certificateless setting." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41697/1/Georg_Lippold_Thesis.pdf.
Повний текст джерелаFurqan, Zeeshan. "DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL WITH RESTRICTED SEC." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2864.
Повний текст джерелаPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
Ponge, Julien. "Model based analysis of Time-aware Web service interactions." Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2008. http://tel.archives-ouvertes.fr/tel-00730187.
Повний текст джерелаAyaida, Marwane. "Contribution aux communications intra-véhicule et inter-véhicules." Thesis, Reims, 2012. http://www.theses.fr/2012REIMS016/document.
Повний текст джерелаModern vehicles are equipped with various devices that aim to automate tasks (shift transmission, cruise control, etc.) or to provide services to the user (driver assistance, obstacle detection, etc.). Communications between vehicles help to expand these services through the collaboration of several vehicles (accident prevention, traffic management, etc.). The proliferation of these devices, their interfaces and protocols makes the data exchange more complex. In addition, inter-vehicle communication is more restrictive because of the vehicles' high mobility.In this work, we propose the design of a communication channel Connect to All (C2A) that ensures the interoperability between embedded devices in a vehicle. In fact, it detects the equipment connection, recognizes it and allows it to exchange data with other devices. The channel design starts by the modelling step using two different techniques (the model checker tool UPPAAL and the Specification and Description Language (SDL). Then, we validate the designed models. We also detail a concrete implementation of the channel on an embedded chip that aims to show the C2A interoperability concept feasibility.We also studied the mobility effects in the inter-vehicular communication through a hybrid approach mixing routing and location-based service. This approach provides a mechanism to reduce vehicle-tracking costs while increasing routing performances. Moreover, we compare two applications of this approach: Hybrid Routing and Grid Location Service (HRGLS) and Hybrid Routing and Hierarchical Location Service (HRHLS) with classical approaches to prove the added value. Then, this approach is improved with a mobility prediction algorithm. The latter allows a better understanding of the vehicle movements by estimating them. Similarly, the hybrid approach with mobility prediction Predictive Hybrid Routing and Hierarchical Location Service (PHRHLS) is compared with the basic approach and HRHLS in order to show the mobility prediction advantages
Strengbom, Kristoffer. "Mobile Services Based Traffic Modeling." Thesis, Linköpings universitet, Matematisk statistik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-116459.
Повний текст джерелаDu, Rong. "Secure electronic tendering." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16606/1/Rong_Du_Thesis.pdf.
Повний текст джерелаDu, Rong. "Secure electronic tendering." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Повний текст джерелаOliveira, André Luiz Machado de. "Estudo de um Sistema de Telefonia sem Infraestrutura através de Modelagem e Simulação baseada em Agentes." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/100/100132/tde-28122012-092709/.
Повний текст джерелаThe technological development of Wireless Networks leads to more intelligent networks structures. One can imagine a mobile data system consisting of autonomous mobile devices that do not require any pre-established infrastructure to exchange information one with another, limited mainly by the transmission radius. Thus, data could be forwarded from node to node, forming a multihop network. The absence of a central entity could also improve fault tolerance by allowing redundant paths for nodes to communicate. We analyzed the performance of the system in different scenarios and system behavior regarding parameters variations such as transmission radius, interferences, the number of nodes and maximum allowed number of hops (TTL), and tested communication strategies with fixed radius, variable radius, minimum number of neighbors to transmit, etc., through modeling and simulation-based agents. In general, variable radius strategy had the best rate of incoming messages and the lowest average number of hops to the destination. However it presented the higher level of system energy. In one hand, fixed radius strategy presented the lowest total energy expended by the system to send messages, but, in the other hand, the rate of incoming messages was lower. Furthermore, we discovered the main causes of packet losses are associated with increased mobility, reducing the TTL and interference, each of which contributes more or less in accordance with the scenario.
Hitchcock, Yvonne Roslyn. "Elliptic curve cryptography for lightweight applications." Thesis, Queensland University of Technology, 2003. https://eprints.qut.edu.au/15838/1/Yvonne_Hitchcock_Thesis.pdf.
Повний текст джерелаHitchcock, Yvonne Roslyn. "Elliptic Curve Cryptography for Lightweight Applications." Queensland University of Technology, 2003. http://eprints.qut.edu.au/15838/.
Повний текст джерелаGodse, Aditi. "Petri net based model for protocol damage detection and protection." 2007. http://digital.library.okstate.edu/etd/umi-okstate-2188.pdf.
Повний текст джерелаCheng, Chia-Hsun, and 鄭嘉勳. "RTL-to-TL Model Generation Based on Protocol Abstraction Techniques." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/13397534790692267303.
Повний текст джерела國立臺灣大學
電子工程學研究所
102
Simulation-based verification is a fundamental verification methodology for validating digital designs. The ever-increasing complexity of system arises from design growing from simple controllers to complex System-on-Chips (SoCs). The complexity leads to the slow simulation-speed for system-level Register Transfer Level (RTL) simulation that cannot catch up with the growing complexity of integrated RTL blocks on a SOC. This work proposes the techniques to increase the simulation speed by transforming the designs from RTL to transaction-level (TL) models in SystemC, a standard for modeling electrical systems. From RTL to TL, the timing granularity is different and the notion of equivalence should be redefined to cross different abstraction levels. To achieve the abstraction and maintain the equivalence, we defined the Protocol Specification Language (PSL) for user to formulate the handshaking signals and cared transaction boundaries in RTL. From the RTL description and PSL specification, the formal model – Extended Finite State Machine (EFSM) can be extracted and simplified based on formal and compiler transformation techniques. In the last code generation phase, we perform several optimizations and generate corresponding TL SystemC simulation models. The experimental results show that the simulation speed can be increased several times and the manual effort to craft the correct untimed SystemC model can be alleviated.
Chen, Yuenfu, and 陳元甫. "MAY: A Highly Fault Tolerant Routing Protocol Based on Hypercube Model." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/76739766666882234180.
Повний текст джерела國立中正大學
通訊工程研究所
99
As more and more real wireless sensor network (WSN) applications are tested and deployed over the last decade, the research community of WSN realizes that several issues need to be revisited from practical perspectives, such as reliability and availability. Basically, wireless sensor networks suffer from resource limitations, high failure rates and faults caused by the defective natures of wireless communication and the wireless sensor characteristics. The design and analysis of fault tolerant routing schemes for WSNs has been the focus of much recent research. In this paper, we propose a hypercube based fault-tolerant WSN routing protocol, Majestic Active Yoda (MAY), which conducts a sensor to deliver the packet to its destination without a routing table. The simulation results show that the proposed MAY routing protocol improves the availability and robustness of the network by using the properties of hypercube architecture.
de, Wet Nico. "Model Driven Communication Protocol Engineering and Simulation based Performance Analysis using UML 2.0." Thesis, 2005. http://pubs.cs.uct.ac.za/archive/00000199/.
Повний текст джерелаLiang, Yu-Tsung, and 梁裕宗. "Development of Personal Computer Based Flight Simulator With Distributed Interactive Simulator Protocol-- Development of Mathematical Model." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/57883413703920173088.
Повний текст джерела淡江大學
機械工程學系
85
Most of flight simulators are based on expensive workstations or other high-end computing equipment. To provide a high-end and low-cost flight simulator, an experiment using networked personal computers (PCs) for fairly sophisticated flight simulation with DIS protocol is presented. Two Pentium PCs connected with TCP/IP or IPX local area network protocol are used as a flight simulator. One of them is used as the work platform for the computation of flight dynamics and Dead Reckoning models, and implementaon of pilot interface. The other one is used as the work platform for visual effect and DIS system. In this study, the flight dynamic model of flight simulator is derived. The aircraft is assumed as a rigid body, the behavior of flight can be described by Six-Degree-of-Freedom (6DOF) equations of motion. Also the real-time configured numerical integration method, and the coordinate systems, earth model, which are compatible with the DIS protocol, are developed. Dead Reckoning (DR) algorithm is an important chnique that is widely used in DIS. The purpose of DR is to reduce updates required by each simulator on the network to better utilize the available bandwidth. Extrapolation formulas are discussed based on network communication traffic and the amount of computation performed by simulators. Smoothing method used during data update process is also discussed. With this study, a low cost, efficient high-fidelity networked PC flight simulator is feasible.
Alvarez, Charles Conceicao, and 安查爾. "New Business Model on IP (Web) based Network - Voice over Internet Protocol (VoIP) Technology (Telecommunications Industry)." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/24714424707511802749.
Повний текст джерелаKumar, Vikas. "Construction of Secure and Efficient Private Set Intersection Protocol." Thesis, 2013. http://hdl.handle.net/2005/3277.
Повний текст джерела"Development of a non-steroidal aromatase inhibitor-based protocol for the control of ovarian function using a bovine model." Thesis, 2013. http://hdl.handle.net/10388/ETD-2013-06-1065.
Повний текст джерелаPlappert, H., C. Hobson-Merrett, B. Gibbons, E. Baker, S. Bevan, M. Clark, S. Creanor, et al. "Evaluation of a primary care-based collaborative care model (PARTNERS2) for people with diagnoses of schizophrenia, bipolar, or other psychoses: study protocol for a cluster randomised controlled trial." 2003. http://hdl.handle.net/10454/18577.
Повний текст джерелаCurrent NHS policy encourages an integrated approach to provision of mental and physical care for individuals with long term mental health problems. The 'PARTNERS2' complex intervention is designed to support individuals with psychosis in a primary care setting. The trial will evaluate the clinical and cost-effectiveness of the PARTNERS2 intervention. This is a cluster randomised controlled superiority trial comparing collaborative care (PARTNERS2) with usual care, with an internal pilot to assess feasibility. The setting will be primary care within four trial recruitment areas: Birmingham & Solihull, Cornwall, Plymouth, and Somerset. GP practices are randomised 1:1 to either (a) the PARTNERS2 intervention plus modified standard care ('intervention'); or (b) standard care only ('control'). PARTNERS2 is a flexible, general practice-based, person-centred, coaching-based intervention aimed at addressing mental health, physical health, and social care needs. Two hundred eligible individuals from 39 GP practices are taking part. They were recruited through identification from secondary and primary care databases. The primary hypothesis is quality of life (QOL). Secondary outcomes include: mental wellbeing, time use, recovery, and process of physical care. A process evaluation will assess fidelity of intervention delivery, test hypothesised mechanisms of action, and look for unintended consequences. An economic evaluation will estimate its cost-effectiveness. Intervention delivery and follow-up have been modified during the COVID-19 pandemic. The overarching aim is to establish the clinical and cost-effectiveness of the model for adults with a diagnosis of schizophrenia, bipolar, or other types of psychoses.
PARTNERS2 is funded by the National Institute for Health Research (NIHR) under its Programme Grant for Applied Research Programme (grant number: RP-PG- 200625). This research was also supported by the NIHR Collaboration for Leadership in Applied Health Research and Care South West Peninsula at the Royal Devon and Exeter NHS Foundation Trust.
Plappert, H., C. Hobson-Merrett, B. Gibbons, E. Baker, S. Bevan, M. Clark, S. Creanor, et al. "Evaluation of a primary care-based collaborative care model (PARTNERS2) for people with diagnoses of schizophrenia, bipolar, or other psychoses: study protocol for a cluster randomised controlled trial." 2021. http://hdl.handle.net/10454/18577.
Повний текст джерелаCurrent NHS policy encourages an integrated approach to provision of mental and physical care for individuals with long term mental health problems. The 'PARTNERS2' complex intervention is designed to support individuals with psychosis in a primary care setting. The trial will evaluate the clinical and cost-effectiveness of the PARTNERS2 intervention. This is a cluster randomised controlled superiority trial comparing collaborative care (PARTNERS2) with usual care, with an internal pilot to assess feasibility. The setting will be primary care within four trial recruitment areas: Birmingham & Solihull, Cornwall, Plymouth, and Somerset. GP practices are randomised 1:1 to either (a) the PARTNERS2 intervention plus modified standard care ('intervention'); or (b) standard care only ('control'). PARTNERS2 is a flexible, general practice-based, person-centred, coaching-based intervention aimed at addressing mental health, physical health, and social care needs. Two hundred eligible individuals from 39 GP practices are taking part. They were recruited through identification from secondary and primary care databases. The primary hypothesis is quality of life (QOL). Secondary outcomes include: mental wellbeing, time use, recovery, and process of physical care. A process evaluation will assess fidelity of intervention delivery, test hypothesised mechanisms of action, and look for unintended consequences. An economic evaluation will estimate its cost-effectiveness. Intervention delivery and follow-up have been modified during the COVID-19 pandemic. The overarching aim is to establish the clinical and cost-effectiveness of the model for adults with a diagnosis of schizophrenia, bipolar, or other types of psychoses.
PARTNERS2 is funded by the National Institute for Health Research (NIHR) under its Programme Grant for Applied Research Programme (grant number: RP-PG- 200625). This research was also supported by the NIHR Collaboration for Leadership in Applied Health Research and Care South West Peninsula at the Royal Devon and Exeter NHS Foundation Trust.
Jeffrey, Annah Mandu. "A control theoretic approach to HIV/AIdS drug dosage design and timing the initiation of therapy." Thesis, 2006. http://hdl.handle.net/2263/30379.
Повний текст джерелаThesis (PhD)--University of Pretoria, 2006.
Electrical, Electronic and Computer Engineering
Unrestricted
Shabut, Antesar R. M., Keshav P. Dahal, and Irfan U. Awan. "Friendship based trust model to secure routing protocols in mobile Ad Hoc networks." 2014. http://hdl.handle.net/10454/10787.
Повний текст джерелаTrust management in mobile ad hoc networks (MANETs) has become a significant issue in securing routing protocols to choose reliable and trusted paths. Trust is used to cope with defection problems of nodes and stimulate them to cooperate. However, trust is a highly complex concept because of the subjective nature of trustworthiness, and has several social properties, due to its social origins. In this paper, a friendship-based trust model is proposed for MANETs to secure routing protocol from source to destination, in which multiple social degrees of friendships are introduced to represent the degree of nodes' trustworthiness. The model considers the behaviour of nodes as a human pattern to reflect the complexity of trust subjectivity and different views. More importantly, the model considers the dynamic differentiation of friendship degree over time, and utilises both direct and indirect friendship-based trust information. The model overcomes the limitation of neglecting the social behaviours of nodes when evaluating trustworthiness. The empirical analysis shows the greater robustness and accuracy of the trust model in a dynamic MANET environment.
Cheng, Zhengang. "Verifying commitment based business protocols and their compositions: model checking using promela and spin." 2006. http://www.lib.ncsu.edu/theses/available/etd-08092006-005135/unrestricted/etd.pdf.
Повний текст джерелаLin, Yi-Hui, and 林宜慧. "User Efficient Authentication Protocols with Provable Security Based on Standard Reduction and Model Checking." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/73312092348039907525.
Повний текст джерела國立中山大學
資訊工程學系研究所
101
Authentication protocols are used for two parties to authenticate each other and build a secure channel over wired or wireless public channels. However, the present standards of authentication protocols are either insufficiently secure or inefficient for light weight devices. Therefore, we propose two authentication protocols for improving the security and user efficiency in wired and wireless environments, respectively. Traditionally, TLS/SSL is the standard of authentication and key exchange protocols in wired Internet. It is known that the security of TLS/SSL is not enough due to all sorts of client side attacks. To amend the client side security, multi-factor authentication is an effective solution. However, this solution brings about the issue of biometric privacy which raises public concern of revealing biometric data to an authentication server. Therefore, we propose a truly three factor authentication protocol, where the authentication server can verify their biometric data without the knowledge of users’ templates and samples. In the major wireless technologies, extensible Authentication Protocol (EAP) is an authentication framework widely used in IEEE 802.11 WLANs. Authentication mechanisms built on EAP are called EAP methods. The requirements for EAP methods in WLANs authentication have been defined in RFC 4017. To achieve user efficiency and robust security, lightweight computation and forward secrecy, excluded in RFC 4017, are desired in WLAN authentication. However, all EAP methods and authentication protocols designed for WLANs so far do not satisfy all of the above properties. We will present a complete EAP method that utilizes stored secrets and passwords to verify users so that it can (1) meet the requirements of RFC 4017, (2) provide lightweight computation, and (3) allow for forward secrecy. In order to prove our proposed protocols completely, we apply two different models to examine their security properties: Bellare’s model, a standard reduction based on computational model, that reduces the security properties to the computationally hard problems and the OFMC/AVISPA tool, a model checking approach based on formal model, that uses the concept of the search tree to systematically find the weaknesses of a protocol. Through adopting Bellare’s model and OFMC/AVISPA tool, the security of our work is firmly established.
Martins, Miguel Antonio Rodrigues Lopes. "Geração Automática de Código Fonte a Partir de Modelos Formais." Master's thesis, 2013. http://hdl.handle.net/10316/35590.
Повний текст джерелаThe work presented/associated with this document relates to an area of computer science that is described as the generation of source code from the speci cation of a formal model, which shall be referred to as \Code Generation from Formal Models". This area is associated with two background areas, one of which being the area of \Model Checking". Model Checking, as described by Edmund M. Clarke et al.[1], is \a technique for verifying - nite state concurrent systems such as sequential circuit designs and communication protocols". This technique is appropriate for distributed and concurrent systems, since it aids developers in minimizing certain types of risks, such as the possibility that a deadlock will occur in the system at some point in time, preventing further progress, or the occurrence of a race condition. Given that only a model of a system is veri ed, but not the system itself, it naturally follows that it would be useful to generate source code from the model speci cation. This work thus encompasses the generation of source code from PROMELA models, veri ed by the Spin model checker. In its essence, this project attempts to answer the following question: is it possible to generate runnable source code from PROMELA models related to round-based consensus protocols? The short answer to it is \yes, with limitations".