1985
DOI: 10.1109/tse.1985.232547
|View full text |Cite
|
Sign up to set email alerts
|

An Implementation of an Automated Protocol Synthesizer (APS) and Its Application to the X.21 Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
2

Year Published

1990
1990
2012
2012

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(9 citation statements)
references
References 12 publications
0
7
0
2
Order By: Relevance
“…The existing methods of this approach are reviewed as follows. [27] is used in automatically creating a PN of the peer entity of a two-party protocol. The approach designs one party (called local entity 3 in [271) first, verifies its correctness, then applies a set of well-designed transformation rules to generate the corresponding peer entity.…”
Section: Existing Synthesis Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…The existing methods of this approach are reviewed as follows. [27] is used in automatically creating a PN of the peer entity of a two-party protocol. The approach designs one party (called local entity 3 in [271) first, verifies its correctness, then applies a set of well-designed transformation rules to generate the corresponding peer entity.…”
Section: Existing Synthesis Approachesmentioning
confidence: 99%
“…Messages received by an entity must be properly handled. If a received message is not consumed by any process of the entity, the PN is incomplete [27]. Thus, each PSP in Xjg must be able to receive tokens.…”
Section: Z4 (Interactive Tt Generation)mentioning
confidence: 99%
“…Further, we generate the sufficient and necessary deadlock-free Conditions (DFCs) for SMEs [5]. Most synthesis approaches, including top-down/bottom-up [10,[14][15], peer entity generation [16], and the knitting technique [1][2][3][4], do not deal with processes sharing resources. We were thus, motivated, in this work, to extend the knitting technique so that it can also handle Petri net with shared resources.…”
Section: Backward Generationmentioning
confidence: 99%
“…Whenever P changes to P 0 by adding p, generate Q 0 from P;p;Q so that P S 0 consisting of P 0 and Q 0 is free from deadlocks and The proposed method for adding behaviour expressions in a protocol specication is basically a two steps procedure. step 1: From the behaviour expression that is added to the behaviour expression of an entity, we get the peer behaviour expression which is going to be added to the other entity, [5], [6], [7]. We get the peer behaviour expression, q; from p as shown in the Algorithm 3.1. step 2: We add q to Q (or its sub-entities) to obtain Q 0 .…”
Section: Communication Modelmentioning
confidence: 99%