Composable information flow verification for service chain based on model checking

被引:0
|
作者
机构
[1] Xi, Ning
[2] Ma, Jian-Feng
[3] Sun, Cong
[4] Lu, Di
[5] Zhang, Tao
来源
Xi, Ning | 1600年 / Editorial Board of Journal on Communications卷 / 35期
关键词
Model checking;
D O I
10.3969/j.issn.1000-436x.2014.11.003
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Composable Bounds on Information Flow from Distribution Differences
    Ando, Megumi
    Guttman, Joshua D.
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 13 - 29
  • [42] Microarchitecture verification by compositional model checking
    Jhala, R
    McMillan, KL
    COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2001, 2102 : 396 - 410
  • [43] Model checking algorithms for analog verification
    Hartong, W
    Hedrich, L
    Barke, E
    39TH DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2002, 2002, : 542 - 547
  • [44] Model checking for ACL compliance verification
    Huget, MP
    Wooldridge, M
    ADVANCES IN AGENT COMMUNICATION, 2003, 2922 : 75 - 90
  • [45] ebXML verification using model checking
    Di Sciascio, E
    Donini, FM
    Mongiello, M
    Piscitelli, G
    ITI 2004: PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY INTERFACES, 2004, : 455 - 460
  • [46] Verification of clinical guidelines by model checking
    Perez, Beatriz
    Porres, Ivan
    PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 2008, : 114 - +
  • [47] Model Checking: Algorithmic Verification and Debugging
    Clarke, Edmund M.
    Emerson, E. Allen
    Sifakis, Joseph
    COMMUNICATIONS OF THE ACM, 2009, 52 (11) : 75 - 84
  • [48] Model Checking for Verification of Quantum Circuits
    Ying, Mingsheng
    FORMAL METHODS, FM 2021, 2021, 13047 : 23 - 39
  • [49] On Applying Model Checking in Formal Verification
    Hjort, Hakan
    2022 FORMAL METHODS IN COMPUTER-AIDED DESIGN, FMCAD, 2022, 3 : 3 - 3
  • [50] Applying model checking to workflow verification
    Pfeiffer, JH
    Rossak, WR
    Speck, A
    11TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2004, : 144 - 151