{"title":"验证通信协议的代数方法","authors":"A. Benslimane","doi":"10.1109/FTDCS.1992.217517","DOIUrl":null,"url":null,"abstract":"Realizing the need for a precise model of computer communications protocols, many different approaches are being investigated. The author presents an algebraic approach to formally specify protocols composed of many modules. The protocols studied are described in the model of finite state machine and then transformed into a set of process equations. The main concept consists in carrying out transformations on these equations in order to prove some properties. The reachability analysis can then be defined in the form of algebraic transformation rules applied to the global system states. The properties to verify during the communication between processes are the detection of some logical errors such as deadlocks, blocking or unspecified receptions.<<ETX>>","PeriodicalId":186762,"journal":{"name":"Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"An algebraic approach to validate communication protocols\",\"authors\":\"A. Benslimane\",\"doi\":\"10.1109/FTDCS.1992.217517\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Realizing the need for a precise model of computer communications protocols, many different approaches are being investigated. The author presents an algebraic approach to formally specify protocols composed of many modules. The protocols studied are described in the model of finite state machine and then transformed into a set of process equations. The main concept consists in carrying out transformations on these equations in order to prove some properties. The reachability analysis can then be defined in the form of algebraic transformation rules applied to the global system states. The properties to verify during the communication between processes are the detection of some logical errors such as deadlocks, blocking or unspecified receptions.<<ETX>>\",\"PeriodicalId\":186762,\"journal\":{\"name\":\"Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-04-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FTDCS.1992.217517\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Third Workshop on Future Trends of Distributed Computing Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FTDCS.1992.217517","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An algebraic approach to validate communication protocols
Realizing the need for a precise model of computer communications protocols, many different approaches are being investigated. The author presents an algebraic approach to formally specify protocols composed of many modules. The protocols studied are described in the model of finite state machine and then transformed into a set of process equations. The main concept consists in carrying out transformations on these equations in order to prove some properties. The reachability analysis can then be defined in the form of algebraic transformation rules applied to the global system states. The properties to verify during the communication between processes are the detection of some logical errors such as deadlocks, blocking or unspecified receptions.<>