Abstract

The article deals with the problem of designing protocols for information and technical interaction, which have a sign of correctness. For this, its model is built in graphical and analytical form, as well as using a modified adjacency matrix. A classification of modules participating in the interaction is proposed, namely the following: terminal sensor and executor, degenerate handler, object storage, intermediate handler. Five correctness requirements for the protocol are introduced: the need and sufficiency of exchange objects, input and output terminality of modules, and their involvement. For each of the requirements, a formal definition is given - in terms of an adjacency matrix, as well as an algorithm for their verification. The synthesized requirements and algorithms are used for the author›s protocol of information and technical interaction in an integrated information security system. As a result, the correctness of the protocol is proved.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call