APA 6th Edition Piscitelli, G., Donini, F.M., Mongiello, M. i Di Sciascio, E. (2001). Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking. Journal of computing and information technology, 9 (3), 185-195. https://doi.org/10.2498/cit.2001.03.03
MLA 8th Edition Piscitelli, Giacomo, et al. "Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking." Journal of computing and information technology, vol. 9, br. 3, 2001, str. 185-195. https://doi.org/10.2498/cit.2001.03.03. Citirano 19.04.2021.
Chicago 17th Edition Piscitelli, Giacomo, Francesco M. Donini, Marina Mongiello i Eugenio Di Sciascio. "Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking." Journal of computing and information technology 9, br. 3 (2001): 185-195. https://doi.org/10.2498/cit.2001.03.03
Harvard Piscitelli, G., et al. (2001). 'Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking', Journal of computing and information technology, 9(3), str. 185-195. https://doi.org/10.2498/cit.2001.03.03
Vancouver Piscitelli G, Donini FM, Mongiello M, Di Sciascio E. Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking. Journal of computing and information technology [Internet]. 2001 [pristupljeno 19.04.2021.];9(3):185-195. https://doi.org/10.2498/cit.2001.03.03
IEEE G. Piscitelli, F.M. Donini, M. Mongiello i E. Di Sciascio, "Automatic Support for Verification of Secure Transactions in Distributed Environment using Symbolic Model Checking", Journal of computing and information technology, vol.9, br. 3, str. 185-195, 2001. [Online]. https://doi.org/10.2498/cit.2001.03.03
Sažetak Electronic commerce needs the aid of software tools to check the validity of business processes in order to fully automate the exchange of information through the network. Symbolic model checking has been used to formally verify specifications of secure transactions in a system for business-to-business applications. The fundamental principles behind symbolic model checking are presented along with techniques used to model mutual exclusion of processes and atomic transactions. The computational resources required to check the example process are presented, and the faults are detected through symbolic verification.