• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    • Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • N-PAT: A Nested Model-Checker

    Thumbnail
    View/Open
    Dong435846-Accepted.pdf (241.9Kb)
    File version
    Accepted Manuscript (AM)
    Author(s)
    Bride, Hadrien
    Cai, Cheng-Hao
    Dong, Jin Song
    Gore, Rajeev
    Hou, Zhe
    Mahony, Brendan
    McCarthy, Jim
    Griffith University Author(s)
    Hou, Zhe
    Dong, Jin-Song
    Year published
    2020
    Metadata
    Show full item record
    Abstract
    N-PAT is a new model-checking tool that supports the verification of nested-models, i.e. models whose behaviour depends on the results of verification tasks. In this paper, we describe its operation and discuss mechanisms that are tailored to the efficient verification of nested-models. Further, we motivate the advantages of N-PAT over traditional model-checking tools through a network security case study.N-PAT is a new model-checking tool that supports the verification of nested-models, i.e. models whose behaviour depends on the results of verification tasks. In this paper, we describe its operation and discuss mechanisms that are tailored to the efficient verification of nested-models. Further, we motivate the advantages of N-PAT over traditional model-checking tools through a network security case study.
    View less >
    Conference Title
    Lecture Notes in Computer Science
    Volume
    12167
    DOI
    https://doi.org/10.1007/978-3-030-51054-1_22
    Copyright Statement
    © Springer Nature Switzerland AG 2020. This is the author-manuscript version of this paper. Reproduced in accordance with the copyright policy of the publisher.The original publication is available at www.springerlink.com
    Subject
    Software engineering
    Publication URI
    http://hdl.handle.net/10072/395668
    Collection
    • Conference outputs

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E
    • TEQSA: PRV12076

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander