E. Di Sciascio, F. Donini, M. Mongiello, G. Piscitelli
{"title":"ebXML verification using model checking","authors":"E. Di Sciascio, F. Donini, M. Mongiello, G. Piscitelli","doi":"10.1109/ITI.2004.242172","DOIUrl":null,"url":null,"abstract":"Symbolic model checking has been used to formally verify specifications of secure transactions in a system for ebXML-based business-to-business. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and faults detected in this process through symbolic verification are documented. Three main weakness of the protocol have emerged and useful suggestions are provided for using ebXML in developing real system","PeriodicalId":320305,"journal":{"name":"26th International Conference on Information Technology Interfaces, 2004.","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"26th International Conference on Information Technology Interfaces, 2004.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITI.2004.242172","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Symbolic model checking has been used to formally verify specifications of secure transactions in a system for ebXML-based business-to-business. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and faults detected in this process through symbolic verification are documented. Three main weakness of the protocol have emerged and useful suggestions are provided for using ebXML in developing real system