UPnP is a universal plug and play technology which is widely used in the digital family network. The UPnP security ceremonies expend the UPnP technology to meet the important security requirement. This paper introduce...
详细信息
UPnP is a universal plug and play technology which is widely used in the digital family network. The UPnP security ceremonies expend the UPnP technology to meet the important security requirement. This paper introduces a formal method named the Petri Net, using its advantage such as intuitive graphical representation and rigorous mathematical theory to model the security control of the UPnP security ceremonies. This paper simulates the security control in actual security system, using occurrence step and transition sequence of Petri Net model to analyze the accessibility of model and verify the non-repudiation and security of system.
The development of mobile computing is dependent on the new methods, techniques and tools to support engineering applications during all the phases of its life cycle. Especially, considering the complexities of intera...
详细信息
The development of mobile computing is dependent on the new methods, techniques and tools to support engineering applications during all the phases of its life cycle. Especially, considering the complexities of interaction protocol, a communication failure can cause high economic losses. The challenge problems to be solved include: 1) guarantee such critical behaviors as communication reliable, and 2) support the dynamic reconfiguration in case some required services may become unavailable when an interaction is executed at runtime phase, both of which belongs to the scope of the reliability problem of interactive behaviors. This paper will perform the automated verification to ensure high reliability of mobile computing using model checking technique. For this purpose, an approach to modeling the interactive behaviors is proposed by using TS model (Transition Systems model, TS model). The reliability properties, including liveness, safety and reachability, are expressed into the temporal logic formulae, namely, CTL (Computation Tree Logic, CTL). Then the reliability verification for our proposed model of interactive behaviors (TS-mc model) is performed in model checker NuSMV. A prototype system is also discussed, and the experimental results show the significant advantage of our method.
Cloud computing has become an emerging new computing paradigm. However, the issue of providing complex enterprise product family cloud is not well addressed so far. This article presents a framework featuring an in-de...
详细信息
Many applications of grid computing are appearing to solve a scientific or technical problem by shaping and coordinating computational services across the network. The dynamic and complex interaction of grid computing...
详细信息
Many applications of grid computing are appearing to solve a scientific or technical problem by shaping and coordinating computational services across the network. The dynamic and complex interaction of grid computing has been a big challenge in guaranteeing the reliability of services behaviors. This paper focuses on the behavioral correctness of grid computing. In order to unify the expression of grid computing behaviors, we introduce the BPMN (Business Process Modeling Notation) to formally describe the interactions in a visualization way with the basic business process concepts, which creates a standardized bridge for the gap between the business process logic design and implementation. Then we translate BPMN to an extended FSM (Finite-State Machine) automaton. Furthermore, the safety and liveness properties of behavioral requirements are expressed as LTL (Linear Temporal Logic) formulae according to coverage criterions. After that, LTL formulae are automatically verified in model checker tool SMV (Symbolic Model Checker). Finally, the experimental results are discussed. In conclusion, our method affords an underlying guideline for modeling and verifying grid computing.
Web applications can only be accessed through dedicated client systems called Web browsersThe behaviors of Web browser's interactions influence the functionalities and navigation of Web applicationsIn the past, on...
详细信息
Web applications can only be accessed through dedicated client systems called Web browsersThe behaviors of Web browser's interactions influence the functionalities and navigation of Web applicationsIn the past, on stage of Web application design and modeling, Web browsers' interactions are not taken into accountTherefore, in the later implementation phase, it only relies on the developer's experienceThis gives a challenge to the follow-up testingIn this paper, starting from a conventional page navigation graph of a Web application, we propose an approach to transform page navigation graph into FSM-BI(FSM with Web browser's interactions), and further, design and implement a prototype tool, called AGT4W(Automatic Generating Tests for Web Applications)Based on the FSM-BI, the automated generation of test cases was implementedAdditionally, the detailed process and implementation methods were give outFirstly, we use Argo UML to model a traditional Web page navigation graph and import it as a XMI fileSecondly, we transform the XMI file into FSM-BI, so we got a FSM modelThirdly, based on FSM model, we transform FSM model into FSM Test-TreeFinally, automatic generation of test cases was carried out.
softwaretesting is a difficult task and testing Web applications may be more difficult, due to their characteristics. Web application is an interactive one since it came into being. How to model and test Web interact...
详细信息
Service composition is widely applied in different applications. One key issue is how to model and analyze time-related properties for service composition. A model called service composition time-constrained Petri Net...
详细信息
In the heterogeneous and open networks, reputation can help users to make a decision about whether or not to have a transaction with other entities. The feedback data used to evaluate the reputation always comes from ...
详细信息
In this paper we propose an innovative verifiable reputation management scheme based on RSA threshold secret sharing in P2P networks. This scheme employs RSA threshold secret sharing theory to realize management of th...
详细信息
With the development of information technology, a large number of software products enter the maintenance phase. The maintainability of software products continues to attract people's attention. This paper propose...
详细信息
暂无评论