Symbolic analysis of the proposed UDT security architecture
- Publication Type:
- Conference Proceeding
- Citation:
- Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, 2012, pp. 171 - 176
- Issue Date:
- 2012-05-14
Closed Access
Filename | Description | Size | |||
---|---|---|---|---|---|
2012004355OK.pdf | 356.28 kB |
Copyright Clearance Process
- Recently Added
- In Progress
- Closed Access
This item is closed access and not available.
In this paper, we analyze our UDT security architecture using rewrite based systems and automata. We present and use symbolic analysis approach to effectively verify our proposed architecture. This approach allows dataflow replication in the implementation of selected mechanisms integrated into the proposed architecture. We consider this approach effective by utilizing the properties of the rewrite systems to represent specific flows of the architecture to present a theoretical and reliable method toper form the analysis. We introduce abstract representation of the components that composes the architecture and conductour analysis, through structural, semantics and query analyses. The result of this work, which is first in the literature, is amore robust theoretical and practical representation of a viable security architecture of UDT that is applicable to other high speed network protocols. © 2012 IEEE.
Please use this identifier to cite or link to this item: