1 research outputs found

    Symbolic analysis of the proposed UDT security architecture

    Full text link
    In this paper, we analyze our UDT security architecture using rewrite based systems and automata. We present and use symbolic analysis approach to effectively verify our proposed architecture. This approach allows dataflow replication in the implementation of selected mechanisms integrated into the proposed architecture. We consider this approach effective by utilizing the properties of the rewrite systems to represent specific flows of the architecture to present a theoretical and reliable method toper form the analysis. We introduce abstract representation of the components that composes the architecture and conductour analysis, through structural, semantics and query analyses. The result of this work, which is first in the literature, is amore robust theoretical and practical representation of a viable security architecture of UDT that is applicable to other high speed network protocols. © 2012 IEEE
    corecore