E. Di Sciascio, F. Donini, M. Mongiello, G. Piscitelli
{"title":"使用模型检查的ebXML验证","authors":"E. Di Sciascio, F. Donini, M. Mongiello, G. Piscitelli","doi":"10.1109/ITI.2004.242172","DOIUrl":null,"url":null,"abstract":"Symbolic model checking has been used to formally verify specifications of secure transactions in a system for ebXML-based business-to-business. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and faults detected in this process through symbolic verification are documented. Three main weakness of the protocol have emerged and useful suggestions are provided for using ebXML in developing real system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"ebXML verification using model checking\",\"authors\":\"E. Di Sciascio, F. Donini, M. Mongiello, G. Piscitelli\",\"doi\":\"10.1109/ITI.2004.242172\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Symbolic model checking has been used to formally verify specifications of secure transactions in a system for ebXML-based business-to-business. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and faults detected in this process through symbolic verification are documented. Three main weakness of the protocol have emerged and useful suggestions are provided for using ebXML in developing real system\",\"PeriodicalId\":320305,\"journal\":{\"name\":\"26th International Conference on Information Technology Interfaces, 2004.\",\"volume\":\"131 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-06-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"26th International Conference on Information Technology Interfaces, 2004.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITI.2004.242172\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"26th International Conference on Information Technology Interfaces, 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITI.2004.242172","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Symbolic model checking has been used to formally verify specifications of secure transactions in a system for ebXML-based business-to-business. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and faults detected in this process through symbolic verification are documented. Three main weakness of the protocol have emerged and useful suggestions are provided for using ebXML in developing real system