2003
DOI: 10.1007/3-540-36576-1_17
|View full text |Cite
|
Sign up to set email alerts
|

Cones and Foci for Protocol Verification Revisited

Abstract: Abstract. We define a cones and foci proof method, which rephrases the question whether two system specifications are branching bisimilar in terms of proof obligations on relations between data objects. Compared to the original cones and foci method from Groote and Springintveld [22], our method is more generally applicable, and does not require a preprocessing step to eliminate τ -loops. We prove soundness of our approach and give an application.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…• The cones and foci method from [13,23] [13] for the technical details of the cones and foci technique.…”
Section: µCrl µCrlmentioning
confidence: 99%
See 3 more Smart Citations
“…• The cones and foci method from [13,23] [13] for the technical details of the cones and foci technique.…”
Section: µCrl µCrlmentioning
confidence: 99%
“…By the cones and foci method we obtain the following matching criteria (cf. [13]). Trivial matching criteria are left out.…”
Section: H ≤ Next-empty( Q ) Summands E G H Imentioning
confidence: 99%
See 2 more Smart Citations
“…An earlier version of this paper (lacking the formalization in PVS and the methodology for reachability analysis) appeared as [15].…”
Section: Introductionmentioning
confidence: 98%