2000
DOI: 10.1007/3-540-46562-6_22
|View full text |Cite
|
Sign up to set email alerts
|

Compositional Verification of CCS Processes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2001
2001
2008
2008

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(18 citation statements)
references
References 9 publications
0
18
0
Order By: Relevance
“…This approach has been successfully used for the compositional verification of CCS programs [7], and even of complex telecommunications software written in the Erlang programming language [9]. The proof system uses Gentzen style sequents, i.e.…”
Section: Proof Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…This approach has been successfully used for the compositional verification of CCS programs [7], and even of complex telecommunications software written in the Erlang programming language [9]. The proof system uses Gentzen style sequents, i.e.…”
Section: Proof Systemmentioning
confidence: 99%
“…Informally, the discharge rule applies if (1) every non-axiom leaf of the proof tree is an instance (up to a substitution) of some ancestor sequent in the proof tree, (2) for each such sequent, this substitution maps some ordinal variable approximating a fixed-point formula to an ordinal variable which is assumed to be smaller, and (3) these separate induction schemes are consistent with each other. For the technical details the interested reader is referred to [8,7,9].…”
Section: Definition 6 (Assertion Sequent)mentioning
confidence: 99%
See 1 more Smart Citation
“…The proof system based method of Dam and Gurov [15] is an example of interactive verification of open systems. Reasoning about open systems in such a proof-theoretic manner can essentially be viewed as a symbolic execution of OTA.…”
Section: Motivationmentioning
confidence: 99%
“…This framework relies on the language-independent model of programs introduced in [12] in order to catch some classical security properties. It has been studied in [4,3,18] (see also [7]) for compositional reasoning about security of open multi-application smart cards. Like e.g.…”
Section: Introductionmentioning
confidence: 99%