Search results for "Formal verification"

showing 9 items of 19 documents

Domain specific language for securities settlement systems

2012

Actual problems during design, implementation and maintenance of securities settlement systems software are achieving complementarity of several different, connected, asynchronously communicating settlement systems and verification of this complementarity. The aim of this paper is to create domain specific language for modeling of settlement systems and their interactions. Then use models to calculate settlement systems behavior. Specific of settlement systems requires that they perform accordingly to business rules in any situation. This makes use of model checking a very desirable step in development process of settlement systems. Defining a domain specific language and creating editor su…

Model checkingDomain-specific languageBusiness rulebusiness.industryComputer scienceBasis path testingComputingMilieux_LEGALASPECTSOFCOMPUTINGcomputer.software_genreComplementarity (physics)SoftwareTest caseData miningSoftware engineeringbusinessFormal verificationcomputer2012 Second International Conference on Digital Information Processing and Communications (ICDIPC)
researchProduct

Survey of Formal Verification Methods for Smart Contracts on Blockchain

2019

Due to the immutable nature of distributed ledger technology such as blockchain, it is of utter importance that a smart contract works as intended before employment outside test network. This is since any bugs or errors will become permanent once published to the live network, and could lead to substantial economic losses; as manifested in the infamous DAO smart contract exploit hack in 2016. In order to avoid this, formal verification methods can be used to ensure that the contract behaves according to given specifications. This paper presents a survey of the state of the art of formal verification of smart contracts. Being a relatively new research area, a standard or best practice for fo…

Model checkingSmart contractExploitComputer science020206 networking & telecommunications02 engineering and technologyFormal methodsComputer securitycomputer.software_genreSyntax (logic)Automated theorem provingOrder (business)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingFormal verificationcomputer2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

Verifying a medical protocol with temporal graphs: the case of a nosocomial disease.

2014

Abstract Objective Our contribution focuses on the implementation of a formal verification approach for medical protocols with graphical temporal reasoning paths to facilitate the understanding of verification steps. Materials and methods Formal medical guideline specifications and background knowledge are represented through conceptual graphs, and reasoning is based on graph homomorphism. These materials explain the underlying principles or rationale that guide the functioning of verifications. Results An illustration of this proposal is made using a medical protocol defining guidelines for the monitoring and prevention of nosocomial infections. Such infections, which are acquired in the h…

Model checking[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationComputation tree logicTheoretical computer scienceComputer scienceModel checking Medical protocolMédecine humaine et pathologieCritical Care and Intensive Care MedicineMedical guidelineConsistency (database systems)Clinical Protocols[ SDV.MHEP ] Life Sciences [q-bio]/Human health and pathologyDrug Resistance BacterialHumansFormal verificationProblem SolvingProtocol (science)Cross Infectionbusiness.industryVisual informationModels TheoreticalModélisation et simulationNosocomial diseases[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationConceptual graphsCatheter-Related InfectionsConceptual graphCarrier StateVisual modelingDisease SusceptibilitySoftware engineeringbusiness[SDV.MHEP]Life Sciences [q-bio]/Human health and pathologyAlgorithmsJournal of critical care
researchProduct

Formal Modeling and Discrete-Time Analysis of BPEL Web Services

2008

International audience; Web services are increasingly used for building enterprise information systems according to the Service Oriented Architecture (SOA) paradigm. We propose in this paper a tool-equipped methodology allowing the formal modeling and analysis of Web services described in the BPEL language. The discrete-time transition systems modeling the behavior of BPEL descriptions are obtained by an exhaustive simulation based on a formalization of BPEL semantics using the Algebra of Timed Processes (ATP). These models are then analyzed by model checking value-based temporal logic properties using the CADP toolbox. The approach is illustrated with the design of a Web service for GPS na…

Model checking[ INFO.INFO-MO ] Computer Science [cs]/Modeling and SimulationKnowledge representation and reasoningcomputer.internet_protocolComputer science0211 other engineering and technologies[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE][ INFO.INFO-SE ] Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologycomputer.software_genre01 natural sciencesACM : D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methodsFormal specificationACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methodsACM : D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking0202 electrical engineering electronic engineering information engineeringTemporal logicEnterprise information systemFormal verification021103 operations researchDatabase010405 organic chemistrybusiness.industryApplied Mathematics020207 software engineeringService-oriented architectureSystems modeling[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation0104 chemical sciencesComputer Science ApplicationsACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checkingBusiness Process Execution LanguageModeling and Simulation020201 artificial intelligence & image processingWeb serviceSoftware engineeringbusinesscomputer
researchProduct

Integrated Tool for Assisted Predictive Analytics

2021

Organizations use predictive analysis in CRM (customer relationship management) applications for marketing campaigns, sales, and customer services, in manufacturing to predict the location and rate of machine failures, in financial services to forecast financial market trends, predict the impact of new policies, laws and regulations on businesses and markets, etc. Predictive analytics is a business process which consists of collecting the data, developing accurate predictive model and making the analytics available to the business users through a data visualization application. The reliability of a business process can be increased by modeling the process and formally verifying its correctn…

Model checkingbusiness.industryComputer scienceBusiness processAnalyticsBusiness process modelingPredictive analyticsCustomer relationship managementSoftware engineeringbusinessFormal verificationData warehouse
researchProduct

Improvement of a Service Level Negotiation Protocol using Formal Verification

2013

International audience; The goal of the pervasive connectivity is to enable mobile users to be permanently connected to the Internet. Mobile users are often connected to wireless networks and consuming services that require quality of service guarantees. Accessing services using wireless technologies may make the service delivery vulnerable to security attacks because of the open medium of these technologies. In this context, we need to guarantee both quality of service and security for mobile users communications. In this paper, we present a protocol for service level negotiation which covers both quality of service and security and assigns a profile to each user in order to optimize and a…

Service delivery frameworkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Service Level02 engineering and technologyNegotiation protocolComputer securitycomputer.software_genre[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringProtocol (object-oriented programming)Formal verificationPROMELAcomputer.programming_language060201 languages & linguistics[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryWireless networkQuality of service06 humanities and the artsFormal verificationSecurity servicePromelaSPINService level0602 languages and literature020201 artificial intelligence & image processingThe InternetMobile telephonyFSM modelbusinesscomputerComputer network
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

A spatial role-based authorization framework for sensor network-assisted indoor WLANs

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WIRELESSVITAE.2009.5172549 In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verificati…

business.industryComputer scienceData securityPermissionlaw.inventionResource (project management)lawServerVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Wi-FiMobile telephonybusinessWireless sensor networkFormal verificationComputer network2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology
researchProduct

Formal specification of open standards and the case of RSS v2.0

2014

Open standardization seems to be very popular among software developers as it makes the standard's adoption by the software engineering community easier and smoother. Formal specification methods, on the other hand, while very promising, are being adopted by protocol engineers very slowly; the industry seems to have little motivation to move into this, almost unknown, territory.In this paper the authors present the i) idea of applying formal methods (formal specification techniques) to open standards' specifications, and ii) an example of a formal specification of open standards, RSS v2.0 in particular. The authors support and provide evidence for the advantages of the open standards formal…

ta113Language Of Temporal Ordering SpecificationProgramming languageComputer scienceFormal specificationObject languageAlgebraic specificationSpecification languageRefinementcomputer.software_genreFormal methodscomputerFormal verification
researchProduct