Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
TheSDLandMSC(SAM)workshop,heldeverytwoyears,providesanopend- cussionarenaontopicsrelatedtothemodellingandanalysisofreactivesystems, distributed systems, and real-time systems (e.g., telecommunications, auto- tive, aerospace, and Web-based applications). The SAM workshop is a place for intensive discussions enabling the unfolding of ideas for the future devel- ment and application of SDL and MSC, and of related languages: ASN.1, eODL, TTCN, UML, and URN. The fourth instance of this workshop was held at the University of Ottawa, Canada, from June 1 to June 4, 2004 (http://www.site.uottawa.ca/sam04/). Itwasco-organizedbytheUniversityofOttawa,theSDLForumSociety,andthe International Telecommunication Union (ITU-T). SAM 2004 was also sponsored by SOLINET, SAFIRE-SDL, and Telelogic AB. The workshop welcomed 60 participants from 10 di?erent countries, including SDL Forum members, tool vendors, standardizers, industrial users, and researchers. In 2004, the program was composed of 21 papers, two panel sessions, one tutorial, several posters, and the third edition of the SDL design contest. The papers were selected by the Program Committee from 46 submissions. After postworkshoprevisions,asecondroundofreviewledtotheselectionof19papers for publication in this volume of Lecture Notes in Computer Science. Since the theme proposed for 2004 was Security Analysis and Modelling, the workshop started with a full-day tutorial on black-box security protocols, given by Sjouke Mauw and Cas Cremers. This tutorial introduced the basics of security protocols (which are “three-line programs that people still manage to get wrong”) and ways of preventing many types of attacks based on a security model, veri?cation, and formal modelling and analysis. Many of the models were expressed as message sequence charts annotated with security properties.
Content Level »Research
Keywords »SDL - SDL specifications - Text - UML - description languages - distributed systems - formal specification - network software development - process communication languages - protocol design - requirements engineering - systems modeling - systems security
SDL and eODL.- Deployment and Configuration of Distributed Systems.- eODL and SDL in Combination for Components.- Applying eODL and SDL-Patterns for Developing TMN Managed Systems.- SPT – The SDL Pattern Tool.- Evolution of Languages.- Comparing UML 2.0 Interactions and MSC-2000.- Data Encoding for SDL in ITU-T Rec. Z.104.- SDL in a Changing World.- Requirements and MSC.- Early Validation of Deployment and Scheduling Constraints for MSC Specifications.- Scenario Synthesis from Imprecise Requirements.- Applying Reduction Techniques to Software Functional Requirement Specifications.- Security.- Proving a Soundness Property for the Joint Design of ASN.1 and the Basic Encoding Rules.- Checking Secrecy by Means of Partial Order Reduction.- Finding Covert Channels in Protocols with Message Sequence Charts: The Case of RMTP2.- SDL and Modelling.- A Metamodel for SDL-2000 in the Context of Metamodelling ULF.- A Flexible Micro Protocol Framework.- ICT Convergence: Modeling Issues.- Experience.- Dealing with Non-local Choice in IEEE 1073.2’s Standard for Remote Control.- Guidelines for Using SDL in Product Development.- Validating Wireless Protocol Conformance Test Cases.