Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Weiqiang Kong is active.

Publication


Featured researches published by Weiqiang Kong.


asia-pacific software engineering conference | 2005

A lightweight integration of theorem proving and model checking for system verification

Weiqiang Kong; Kazuhiro Ogata; Takahiro Seino; Kokichi Futatsugi

Theorem proving and model checking are known as two formal verification techniques that have complementary features. In this paper, we describe a lightweight integration of the two techniques by a translation from theorem proving formalism to model checking formalism, and then treating model checking as part of the decision procedure. In the translation, system and property specifications defined for a theorem prover can be automatically translated to specifications feedable to a model checker after a simple data abstraction. The main aim of this integration is to provide the theorem prover with automatic counter-example generating capability, thus to be able to find bugs in the early stage of theorem proving and ease the hard-work of doing theorem proving. A case study is used to demonstrate how this translation works and what the verification flow is when using this integration to do system verification.


integrated formal methods | 2007

Algebraic approaches to formal analysis of the Mondex electronic purse system

Weiqiang Kong; Kazuhiro Ogata; Kokichi Futatsugi

Mondex is a payment system that utilizes smart cards as electronic purses for financial transactions. This paper first reports on how the Mondex system can be modeled, specified and interactively verified using an equation-based method - the OTS/CafeOBJ method. Afterwards, the paper reports on, as a complementarity, a way of automatically falsifying the OTS/CafeOBJ specification of the Mondex system, and how the falsification can be used to facilitate the verification. Differently from related work, our work provides alternative ways of (1) modeling the Mondex system using an OTS (Observational Transition System), a kind of transition system, and (2) expressing and verifying (and falsifying) the desired security properties of the Mondex system directly in terms of invariants of the OTS.


IEICE Transactions on Information and Systems | 2008

A Specification Translation from Behavioral Specifications to Rewrite Specifications

Masaki Nakamura; Weiqiang Kong; Kazuhiro Ogata; Kokichi Futatsugi

There are two ways to describe a state machine as an algebraic specification: a behavioral specification and a rewrite specification. In this study, we propose a translation system from behavioral specifications to rewrite specifications to obtain a verification system which has the strong points of verification techniques for both specifications. Since our translation system is complete with respect to invariant properties, it helps us to obtain a counter-example for an invariant property through automatic exhaustive searching for a rewrite specification.


formal methods | 2006

Induction-guided falsification

Kazuhiro Ogata; Masahiro Nakano; Weiqiang Kong; Kokichi Futatsugi

The induction-guided falsification searches a bounded reachable state space of a transition system for a counterexample that the system satisfies an invariant property. If no counterexamples are found, it tries to verify that the system satisfies the property by mathematical induction on the structure of the reachable state space of the system, from which some other invariant properties may be obtained as lemmas. The verification and falsification process is repeated for each of the properties until a counterexample is found or the verification is completed. The NSPK authentication protocol is used as an example to demonstrate the induction-guided falsification.


International Journal of Software Engineering and Knowledge Engineering | 2007

SPECIFICATION AND VERIFICATION OF WORKFLOWS WITH RBAC MECHANISM AND SoD CONSTRAINTS

Weiqiang Kong; Kazuhiro Ogata; Kokichi Futatsugi

Security considerations, such as role-based access control (RBAC) mechanism and separation of duty (SoD) constraints, are important and integral to workflow systems. Since the definition of workflows with these security considerations is a complicated and error-prone process, rigorous verification techniques are desirable for uncovering logical errors and assuring correctness. We propose the use of an equation-based method — the OTS/CafeOBJ method to model, specify and verify workflows with such security considerations. Specifically, a workflow with the security considerations, is modeled as an OTS, a kind of transition system; the OTS is then specified in CafeOBJ, an algebraic specification language. We verify that the OTS has desired safety and liveness properties by using the CafeOBJ system as an interactive theorem prover. A case study on a sample workflow that deals with travel expense reimbursement is used to demonstrate our method.


international conference on theory and practice of electronic governance | 2007

Formal support for e-government system design with transparency consideration

Xiaoyi Chen; Weiqiang Kong; Kokichi Futatsugi

In this paper, we introduce formal methods into the field of e-Government (or public administration) for formalizing e-Government system design, trying to extract a formal definition of transparency in public administration from former studies on transparency, and analyzing if the design of e-Government systems satisfies transparency related properties.n Another contribution made in this paper is that we propose a digital right management license language (Public Administration License Language, called PALL as well) for e-Government systems, especially for using it to guarantee the transparency related properties in e-Government system design. Classical digital right license languages are applied to electronic downloading, payment and rendering of artistic works, while we extend the concept of license to cover work authorization in public government. The digital works are public government documents in this context. As digital right license for artistic works seeks to safeguard against privacy and to ensure proper payment for the rights to render these works, PALL seeks to ensure transparent and professional good governance.


computer and information technology | 2004

Formal analysis of an anonymous fair exchange e-commerce protocol

Weiqiang Kong; Kazuhiro Ogata; Jianwen Xiang; Kokichi Futatsugi

Fair exchange and anonymity are important requirements of e-commerce protocols. We have formally analyzed an e-commerce protocol, which is claimed to satisfy the two requirements. The protocol, together with the intruder, has been modeled as an OTS, a kind of transition system. Then the OTS has been written in CafeOBJ, an algebraic specification language. Although most part of the two requirements can be expressed as safety properties, liveness properties are needed to fully express them. We have expressed the safety part of the two requirements in CafeOBJ and partly verified that the OTS satisfies the safety part by writing proof scores in CafeOBJ.


computer and information technology | 2008

Trace anonymity in the OTS/CafeOBJ method

Weiqiang Kong; Kazuhiro Ogata; Jian Cheng; Kokichi Futatsugi

We report on a case study in which the OTS/CafeOBJ method is used to formalize and verify trace anonymity property of distributed systems. In this case study, the property of trace anonymity is formalized with the trace notations of observational transition systems (OTSs), and CafeOBJ language/system is used as an interactive theorem prover to verify that systems satisfy such property. The work presented in the paper follows the approach proposed in [3], in which I/O automaton and Larch prover are employed for handling trace anonymity.


Lecture Notes in Computer Science | 2006

Induction-Guided Falsification

Kazuhiro Ogata; Masahiro Nakano; Weiqiang Kong; Kokichi Futatsugi


IEICE Transactions on Information and Systems | 2010

Towards Reliable E-Government Systems with the OTS/CafeOBJ Method

Weiqiang Kong; Kazuhiro Ogata; Kokichi Futatsugi

Collaboration


Dive into the Weiqiang Kong's collaboration.

Top Co-Authors

Avatar

Kokichi Futatsugi

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Kazuhiro Ogata

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jianwen Xiang

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Masahiro Nakano

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jian Cheng

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Masaki Nakamura

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Takahiro Seino

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaoyi Chen

Japan Advanced Institute of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge