Verification of a signature architecture with HOL-Z

4Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We report on a case study in using HOL-Z, an embedding of Z in higher-order logic, to specify and verify a security architecture for administering digital signatures. We have used HOL-Z to formalize and combine both data-oriented and process-oriented architectural views. Afterwards, we formalized temporal requirements in Z and carried out verification in higher-order logic. The same architecture has been previously verified using the SPIN model checker. Based on this, we provide a detailed comparison of these two different approaches to formalization (infinite state with rich data types versus finite state) and verification (theorem proving versus model checking). Contrary to common belief, our case study suggests that Z is well suited for temporal reasoning about process models with rich data. More-over, our comparison highlights the advantages of this approach and provides evidence that, in the hands of experienced users, theorem proving is neither substantially more time-consuming nor more complex than model checking. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Basin, D., Kuruma, H., Takaragi, K., & Wolff, B. (2005). Verification of a signature architecture with HOL-Z. In Lecture Notes in Computer Science (Vol. 3582, pp. 269–285). Springer Verlag. https://doi.org/10.1007/11526841_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free