Protocol specification & verification methods: An overview

Michael G. Hinchey, Stephen A. Jarvis

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The need for appropriate methods for the specification and verification of data communication protocols is highlighted. Difficulties with commonly-used methods are discussed briefly, and an approach based on a combination of CSP and Timed CSP is advocated.

Original languageEnglish
Title of host publicationProceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering
Subtitle of host publicationCommunications and Networks for the Year 2000, SICON 1993
EditorsE.S. Seumahu, G.S. Poo
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages581-585
Number of pages5
ISBN (Electronic)078031445X, 9780780314450
DOIs
Publication statusPublished - 1993
Event1993 IEEE Singapore International Conference on Networks/International Conference on Information Engineering, SICON 1993 - Singapore, Singapore
Duration: 6 Sep 199311 Sep 1993

Publication series

NameProceedings of IEEE Singapore International Conference on Networks/International Conference on Information Engineering: Communications and Networks for the Year 2000, SICON 1993
Volume2

Conference

Conference1993 IEEE Singapore International Conference on Networks/International Conference on Information Engineering, SICON 1993
Country/TerritorySingapore
CitySingapore
Period6/09/9311/09/93

Bibliographical note

Publisher Copyright:
© 1993 IEEE.

Keywords

  • Communicating Sequential Processes
  • Data communication protocols
  • Protocol specification
  • Protocol verification
  • Timed CSP

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Signal Processing
  • Information Systems
  • Information Systems and Management
  • Media Technology

Fingerprint

Dive into the research topics of 'Protocol specification & verification methods: An overview'. Together they form a unique fingerprint.

Cite this