Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Formal Verification Platform as a Service: WebAssembly Vulnerability Detection Application

    LiangJun Deng1, Hang Lei1, Zheng Yang1, WeiZhong Qian1,*, XiaoYu Li1, Hao Wu2, Sihao Deng3, RuChao Sha1, WeiDong Deng4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2155-2170, 2023, DOI:10.32604/csse.2023.027680 - 03 November 2022

    Abstract In order to realize a general-purpose automatic formal verification platform based on WebAssembly technology as a web service (FVPS), which aims to provide an automated report of vulnerability detections, this work builds a Hyperledger Fabric blockchain runtime model. It proposes an optimized methodology of the functional equivalent translation from source program languages to formal languages. This methodology utilizes an external application programming interface (API) table to replace the source codes in compilation, thereby pruning the part of housekeeping codes to ease code inflation. Code inflation is a significant metric in formal language translation. Namely, minor… More >

  • Open Access

    ARTICLE

    Robust Authentication and Session Key Agreement Protocol for Satellite Communications

    Somayeh Soltani1, Seyed Amin Hosseini Seno1, Juli Rejito2, Rahmat Budiarto3,*

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5891-5910, 2022, DOI:10.32604/cmc.2022.023697 - 14 January 2022

    Abstract Satellite networks are recognized as the most essential communication infrastructures in the world today, which complement land networks and provide valuable services for their users. Extensive coverage and service stability of these networks have increased their popularity. Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks, securing satellite communications is vital. So far, several protocols have been proposed for authentication and key exchange of satellite communications, but none of them fully meet the security requirements. In this paper, we examine one of these protocols and identify its security vulnerabilities.… More >

  • Open Access

    ARTICLE

    A Formal Method for Service Choreography Verification Based on Description Logic

    Tingting Zhang1, 2, 3, *, Yushi Lan2, Minggang Yu1, Changyou Zheng1, Kun Liu1

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 893-904, 2020, DOI:10.32604/cmc.2020.06216

    Abstract Web Services Choreography Description Language lacks a formal system to accurately express the semantics of service behaviors and verify the correctness of a service choreography model. This paper presents a new approach of choreography model verification based on Description Logic. A meta model of service choreography is built to provide a conceptual framework to capture the formal syntax and semantics of service choreography. Based on the framework, a set of rules and constraints are defined in Description Logic for choreography model verification. To automate model verification, the UML-based service choreography model will be transformed, by More >

Displaying 1-10 on page 1 of 3. Per Page