Search results for "Formal verification"
showing 9 items of 19 documents
Domain specific language for securities settlement systems
2012
Actual problems during design, implementation and maintenance of securities settlement systems software are achieving complementarity of several different, connected, asynchronously communicating settlement systems and verification of this complementarity. The aim of this paper is to create domain specific language for modeling of settlement systems and their interactions. Then use models to calculate settlement systems behavior. Specific of settlement systems requires that they perform accordingly to business rules in any situation. This makes use of model checking a very desirable step in development process of settlement systems. Defining a domain specific language and creating editor su…
Survey of Formal Verification Methods for Smart Contracts on Blockchain
2019
Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…
Verifying a medical protocol with temporal graphs: the case of a nosocomial disease.
2014
Abstract Objective Our contribution focuses on the implementation of a formal verification approach for medical protocols with graphical temporal reasoning paths to facilitate the understanding of verification steps. Materials and methods Formal medical guideline specifications and background knowledge are represented through conceptual graphs, and reasoning is based on graph homomorphism. These materials explain the underlying principles or rationale that guide the functioning of verifications. Results An illustration of this proposal is made using a medical protocol defining guidelines for the monitoring and prevention of nosocomial infections. Such infections, which are acquired in the h…
Formal Modeling and Discrete-Time Analysis of BPEL Web Services
2008
International audience; Web services are increasingly used for building enterprise information systems according to the Service Oriented Architecture (SOA) paradigm. We propose in this paper a tool-equipped methodology allowing the formal modeling and analysis of Web services described in the BPEL language. The discrete-time transition systems modeling the behavior of BPEL descriptions are obtained by an exhaustive simulation based on a formalization of BPEL semantics using the Algebra of Timed Processes (ATP). These models are then analyzed by model checking value-based temporal logic properties using the CADP toolbox. The approach is illustrated with the design of a Web service for GPS na…
Integrated Tool for Assisted Predictive Analytics
2021
Organizations use predictive analysis in CRM (customer relationship management) applications for marketing campaigns, sales, and customer services, in manufacturing to predict the location and rate of machine failures, in financial services to forecast financial market trends, predict the impact of new policies, laws and regulations on businesses and markets, etc. Predictive analytics is a business process which consists of collecting the data, developing accurate predictive model and making the analytics available to the business users through a data visualization application. The reliability of a business process can be increased by modeling the process and formally verifying its correctn…
Improvement of a Service Level Negotiation Protocol using Formal Verification
2013
International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…
SecureBallot: A secure open source e-Voting system
2021
Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…
A spatial role-based authorization framework for sensor network-assisted indoor WLANs
2009
©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…
Formal specification of open standards and the case of RSS v2.0
2014
Open standardization seems to be very popular among software developers as it makes the standard's adoption by the software engineering community easier and smoother. Formal specification methods, on the other hand, while very promising, are being adopted by protocol engineers very slowly; the industry seems to have little motivation to move into this, almost unknown, territory.In this paper the authors present the i) idea of applying formal methods (formal specification techniques) to open standards' specifications, and ii) an example of a formal specification of open standards, RSS v2.0 in particular. The authors support and provide evidence for the advantages of the open standards formal…