Coloured Petri nets (2nd ed.): basic concepts, analysis methods and practical use: volume 1
Coloured Petri nets (2nd ed.): basic concepts, analysis methods and practical use: volume 1
ML for the working programmer (2nd ed.)
ML for the working programmer (2nd ed.)
The Definition of Standard ML
Designing a Security System by Means of Coloured Petri Nets
Proceedings of the 17th International Conference on Application and Theory of Petri Nets
CAV '97 Proceedings of the 9th International Conference on Computer Aided Verification
A coloured petri net based tool for course of action development and analysis
CRPIT '02 Proceedings of the conference on Application and theory of petri nets: formal methods in software engineering and defence systems - Volume 12
Implementing Coloured Petri Nets Using a Functional Programming Language
Higher-Order and Symbolic Computation
Graphical microcontroller programming tool based on extended S-System Petri net
CEA'10 Proceedings of the 4th WSEAS international conference on Computer engineering and applications
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
Visual microcontroller programming using extended S-system Petri nets
WSEAS Transactions on Computers
Automatic structure-based code generation from coloured Petri nets: a proof of concept
FMICS'10 Proceedings of the 15th international conference on Formal methods for industrial critical systems
Symbolic Message Sequence Charts
ACM Transactions on Software Engineering and Methodology (TOSEM)
Secure interoperation design in multi-domains environments based on colored Petri nets
Information Sciences: an International Journal
Analyzing and completing middleware designs for enterprise integration using coloured petri nets
CAiSE'13 Proceedings of the 25th international conference on Advanced Information Systems Engineering
Hi-index | 0.00 |
In this paper we describe a method for automatic implementation of systems based on models made by means of Coloured Petri Nets (CP-nets or CPN). The Design/CPN tool has been extended in order to support this method. We do not describe the algorithms and data-structures used to implement the code generation tool but rather the context such a tool is used in. The contribution of this work origins from the fact that the code used to simulate the CPN model and the code used to generate the final system implementation are identical. Hence the behaviour of the model and final system are the same, and analysis results found by means of Design/CPN also hold for the final running system. This is different from other CPN-based code generati0on methods. Furthermore, since the method is fully automatic the traditional manual implementation phase has been eliminated. Thus the method described in this paper dramatically reduces development time and cost compared with prevailing system development methods where system implementation is accomplished manually. In this paper we demonstrate that the method is usable in practice for an industrial case, namely an access control system developed by the Danish security company Dalcotech A/S. A CPN model was made of a realistic access control system scenario. We describe this model and how Dalcotech applied the automatic code generation method in order to obtain a system implementation quickly and safely. In this way Dalcotech now has the capability to reduce the resources spent on the implementation phase.