2013
DOI: 10.1007/s11761-013-0146-2
|View full text |Cite
|
Sign up to set email alerts
|

On expanding protocol conformance checking to exception handling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 32 publications
0
9
0
Order By: Relevance
“…Hence, each run in the PRS-abstraction corresponds to a run in the (P,P)-PRS abstraction (which is equivalent to the Petri nets). Thus, the workflow nets [13] lead to a coarser abstraction than using general PRS [6]. Now, we examine the deadlock situations.…”
Section: Correspondence Between (Gg)-prs and (Pp)-prs Abstractionsmentioning
confidence: 99%
See 2 more Smart Citations
“…Hence, each run in the PRS-abstraction corresponds to a run in the (P,P)-PRS abstraction (which is equivalent to the Petri nets). Thus, the workflow nets [13] lead to a coarser abstraction than using general PRS [6]. Now, we examine the deadlock situations.…”
Section: Correspondence Between (Gg)-prs and (Pp)-prs Abstractionsmentioning
confidence: 99%
“…The behavior of recursive procedures and synchronous procedure calls corresponds to the LIFO principle and requires therefore a stack [8] to trace the calling context. Process rewrite systems (PRSs) are an extension of Petri nets by stacks [9] and therefore PRS allow to model the behavior of (recursive) procedure calls, concurrency (fork), synchronization and exception handling [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…He verified concurrent exception handling related security attributes, asserted the security attributes, and used FDR to analyse validation. Wolf Zimmermann (Heike et al, 2013) proposed an approach for checking whether service protocols are obeyed in a service composition. Service protocols specified for a service legal sequences of operation calls.…”
Section: Modelling and Verification Of Exception Handlingmentioning
confidence: 99%
“…We thank Wolf Zimmermann for pointing out that the argument applies more generally to Mayr's Process Rewrite Systems[12]. They have been used in[11] to verify protocols for services which may rise exceptions.…”
mentioning
confidence: 99%