Verification of S&D Solutions for Network Communications and Devices

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter describes the tool-supported verification of S&D Solutions on the level of network communications and devices. First, the general goals and challenges of verification in the context of AmI systems are highlighted and the role of verification and validation within the SERENITY processes is explained.Then, SERENITY extensions to the SH VErification tool are explained using small examples. Finally, the applicability of existing verification tools is discussed in the context of the AVISPA toolset. The two different tools show that for the security analysis of network and devices S&D Patterns relevant complementary approachesexist and can be used. © Springer Science + Business Media, LLC 2009.

Cite

CITATION STYLE

APA

Rudolph, C., Compagna, L., Carbone, R., Muñoz, A., & Repp, J. (2009). Verification of S&D Solutions for Network Communications and Devices. Advances in Information Security, 45, 143–163. https://doi.org/10.1007/978-0-387-88775-3_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free