{"title":"协议认证中的身份识别介绍","authors":"C. Baron, J. Geffroy","doi":"10.1109/ATW.1994.747848","DOIUrl":null,"url":null,"abstract":"This paper shows how formal identification methods can be applied to communication protocol validation. First the general context of protocol certification is presented according to two points of view: design verification and implementation testing. Then we introduce identification principles and their applications. Last we show the applicability of identification at different levels of conformance testing.","PeriodicalId":217615,"journal":{"name":"The Third Annual Atlantic Test Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2002-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Introduction Of Identification In Protocol Certification\",\"authors\":\"C. Baron, J. Geffroy\",\"doi\":\"10.1109/ATW.1994.747848\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper shows how formal identification methods can be applied to communication protocol validation. First the general context of protocol certification is presented according to two points of view: design verification and implementation testing. Then we introduce identification principles and their applications. Last we show the applicability of identification at different levels of conformance testing.\",\"PeriodicalId\":217615,\"journal\":{\"name\":\"The Third Annual Atlantic Test Workshop\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2002-08-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Third Annual Atlantic Test Workshop\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ATW.1994.747848\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Third Annual Atlantic Test Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATW.1994.747848","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Introduction Of Identification In Protocol Certification
This paper shows how formal identification methods can be applied to communication protocol validation. First the general context of protocol certification is presented according to two points of view: design verification and implementation testing. Then we introduce identification principles and their applications. Last we show the applicability of identification at different levels of conformance testing.