Symbolic analysis of the proposed UDT security architecture

Publication Type:
Conference Proceeding
Citation:
Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, 2012, pp. 171 - 176
Issue Date:
2012-05-14
Full metadata record
Files in This Item:
Filename Description Size
Thumbnail2012004355OK.pdf356.28 kB
Adobe PDF
In this paper, we analyze our UDT security architecture using rewrite based systems and automata. We present and use symbolic analysis approach to effectively verify our proposed architecture. This approach allows dataflow replication in the implementation of selected mechanisms integrated into the proposed architecture. We consider this approach effective by utilizing the properties of the rewrite systems to represent specific flows of the architecture to present a theoretical and reliable method toper form the analysis. We introduce abstract representation of the components that composes the architecture and conductour analysis, through structural, semantics and query analyses. The result of this work, which is first in the literature, is amore robust theoretical and practical representation of a viable security architecture of UDT that is applicable to other high speed network protocols. © 2012 IEEE.
Please use this identifier to cite or link to this item: