Reference Hub13
Introduction of Petri Nets: Its Applications and Security Challenges

Introduction of Petri Nets: Its Applications and Security Challenges

Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge
ISBN13: 9781522501053|ISBN10: 1522501053|EISBN13: 9781522501060
DOI: 10.4018/978-1-5225-0105-3.ch007
Cite Chapter Cite Chapter

MLA

Yamaguchi, Shingo, et al. "Introduction of Petri Nets: Its Applications and Security Challenges." Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, et al., IGI Global, 2016, pp. 145-179. https://doi.org/10.4018/978-1-5225-0105-3.ch007

APA

Yamaguchi, S., Ahmadon, M. A., & Ge, Q. (2016). Introduction of Petri Nets: Its Applications and Security Challenges. In B. Gupta, D. Agrawal, & S. Yamaguchi (Eds.), Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (pp. 145-179). IGI Global. https://doi.org/10.4018/978-1-5225-0105-3.ch007

Chicago

Yamaguchi, Shingo, Mohd Anuaruddin Bin Ahmadon, and Qi-Wei Ge. "Introduction of Petri Nets: Its Applications and Security Challenges." In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security, edited by Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, 145-179. Hershey, PA: IGI Global, 2016. https://doi.org/10.4018/978-1-5225-0105-3.ch007

Export Reference

Mendeley
Favorite

Abstract

This chapter gives an introduction of Petri nets, its applications and security challenges. Petri nets are a graphical and mathematical modeling tool available to many systems. Once a system is modeled as a Petri net, the behavior of the system can be simulated by using tokens on the Petri net. Petri nets' abundant techniques can be used to solve many problems associated with the modeled system. This chapter gives formal definitions, properties and analysis methods of Petri nets, and gives several examples to illustrate some basic concepts and successful application areas of Petri nets. Then this chapter presents Petri nets based challenges to security such as Intrusion Detection System, security policy design and analysis, and cryptography tool.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.