Symbolic Analysis of the Proposed UDT Security Architecture

Publication Type:
Conference Proceeding
2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2012, pp. 171 - 176
Issue Date:
Full metadata record
Files in This Item:
Filename Description SizeFormat
2012004355OK.pdf356.28 kBAdobe PDF
In this paper, we analyze our UDT security architecture using rewrite based systems and automata. We present and use symbolic analysis approach to effectively verify our proposed architecture. This approach allows dataflow replication in the implementation of selected mechanisms integrated into the proposed architecture. We consider this approach effective by utilizing the properties of the rewrite systems to represent specific flows of the architecture to present a theoretical and reliable method to perform the analysis. We introduce abstract representation of the components that composes the architecture and conduct our analysis, through structural, semantics and query analyses. The result of this work, which is first in the literature, is a more robust theoretical and practical representation of a viable security architecture of UDT that is applicable to other high speed network protocols
Please use this identifier to cite or link to this item: