Authors: Iñigo León Samaniego, Mercedes Perez-Parte, Juan-Ignacio Latorre-Biel, Emilio Jiménez-Macías
ing their internal structure from the exterior by using front-ends. A method to build these subnets from the complete Petri net is explained and analyzed matrixed. 2. PNML has no way to represent subnets, so I approach a possible PNML extension to do it. 3. Subnetting and PNML extension to represents subnets allow to apply several security technics that offers encryption, data integrity, authentication and non repudiation