Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-68237-0_13
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…At first glance perhaps, the idea of high-level (i.e., abstract) models may appear to exclude the use of model execution, which, after all, requires sufficient detail to be specified to make it executable. However, modeling tools such as ObjecTime Developer, 21 developed in the early 1990s, demonstrated the feasibility and practicality of executing abstract and incomplete models. Such models typically have a minimum of their core behavior specified, only what is sufficient to make them partially executable.…”
Section: Ability To Execute Abstract (High-level) and Incomplete Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…At first glance perhaps, the idea of high-level (i.e., abstract) models may appear to exclude the use of model execution, which, after all, requires sufficient detail to be specified to make it executable. However, modeling tools such as ObjecTime Developer, 21 developed in the early 1990s, demonstrated the feasibility and practicality of executing abstract and incomplete models. Such models typically have a minimum of their core behavior specified, only what is sufficient to make them partially executable.…”
Section: Ability To Execute Abstract (High-level) and Incomplete Modelsmentioning
confidence: 99%
“…In other words, what is needed is viewpoint-driven observability. Clearly, the technology needed to support 21 https://en.wikipedia.org/wiki/ObjecTime_Developer. this is going to be sophisticated-particularly in the online case-involving inverse transformations of runtime data into desired concern-specific formats.…”
Section: Enhanced Observability Of Executing Modelsmentioning
confidence: 99%
“…In summary, we think that the development of a verified flash file system will need a lot more effort than our previous contribution to the Grand Challenge with the Mondex case study ([12], [25], [24], [10]).…”
Section: Discussionmentioning
confidence: 95%
“…In KIV wp(α,ϕ) is written as |α| ϕ 10. We suppress standard parameters FS, RI and LOG in all predicates and procedure calls for better readability.…”
mentioning
confidence: 99%
“…The fourth was absent in the original Mondex work: the Mondex concrete level assumes that suitable cryptography can be used to protect messages. Elsewhere [21], we have shown that suitable cryptography can indeed be added using another refinement, and that as an instance of a model-driven approach [22] the resulting ASM can be implemented using Java [23], so we do not repeat this here.…”
Section: Introductionmentioning
confidence: 99%