14 Hits in 8.0 sec

Verification of Data-Aware Processes via Array-Based Systems (Extended Version) [article]

Diego Calvanese, Silvio Ghilardi, Alessandro Gianola, Marco Montali, Andrey Rivkin
2019 arXiv   pre-print
We study verification over a general model of artifact-centric systems, to assess (parameterized) safety properties irrespectively of the initial database instance.  ...  To do so, we make use of the model-theoretic machinery of model completion, which surprisingly turns out to be an effective tool for verification of relational systems, and represents the main original  ...  We consider the present work as the starting point for a full line of research dedicated to SMT-based techniques for the effective verification of data-aware processes, addressing richer forms of verification  ... 
arXiv:1806.11459v2 fatcat:j3iv2rnwuvbpzdp6mnlcfie2mq

A Survey on Workflow Satisfiability, Resiliency, and Related Problems [article]

Daniel Ricardo dos Santos, Silvio Ranise
2017 arXiv   pre-print
Several variations of the WSP and similar problems have been defined in the literature and there are many solution methods available.  ...  Workflow management systems and workflow-driven applications need to enforce security policies in the form of access control, specifying which users can execute which tasks, and authorization constraints  ...  [80] developed a framework for formalizing and enforcing purpose-based privacy policies.  ... 
arXiv:1706.07205v1 fatcat:r54f5z6ykvaojpleu6cjwqtmni

Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes

Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise
2015 Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIA CCS '15  
Run-time monitors are crucial to the development of security-aware workflow management systems, which need to mediate access to their resources by enforcing authorization policies and constraints, such  ...  In this paper, we introduce a precise technique to synthesize run-time monitors capable of ensuring the successful termination of workflows while enforcing authorization policies and constraints.  ...  RELATED WORK Verification of array-based systems.  ... 
doi:10.1145/2714576.2714633 dblp:conf/ccs/BertolissiSR15 fatcat:nhesryv5fjczpalbs6ao4jw7nu

D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

Panagiotis Rizomiliotis, Konstantinos Tserpes, Aikaterini Triakosia
2021 Zenodo  
This the second deliverable of Work Package 2 tasks T2.1 (Tools and methods for secure data sharing), T2.2 (Trustworthiness of data flows), T2.3 (Machine learning-based cognitive security framework), T2.4  ...  (Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing  ...  are discharged by backend engines, such as SAT/SMT/OMT solvers, industrial and academic model checking tools, internally developed analytics for specific verification tasks.  ... 
doi:10.5281/zenodo.5667012 fatcat:xgzhqfeq6nbwte4h256pntlkau

Supporting automated containment checking of software behavioural models

Muram Faiz Ul
2017 unpublished
Inconsistencies that are detected at later phases, when the system is already implemented or tested, require huge amounts of time and effort for correction, revision, and verification.  ...  However, the feedback of model checkers is rather not helpful for users with limited background on the underlying formal methods to analyse and understand the causes of consistency violations.  ...  The containment checking of behaviour models using formal verification techniques requires both formal descriptions and consistency constraints of these models.  ... 
doi:10.25365/thesis.47558 fatcat:pqjxp26psfgzlhll6fqybwzp3a

Conference Digest

2020 2020 IEEE Aerospace Conference  
of measuring Martian air temperature, wind speed, atmospheric pressure, and local magnetic fields.  ...  The Auxiliary Payload Sensor Suite (APSS), a collection of environmental sensors carried by the Interior exploration using Seismic Investigations, Geodesy, and Heat Transport (InSight) lander, is capable  ...  We describe the mission specifications using a graphical model based on the Business Process Model and Notation (BPMN) standard.  ... 
doi:10.1109/aero47225.2020.9172613 fatcat:ioqf5ijrx5gvffu3ls34aa2nsq

Lisbon, Portugal VALID 2012 Editors VALID 2012 Committee VALID Advisory Chairs VALID 2012 Technical Progam Committee

Amir Alimohammad, Petre Dini, Amir Alimohammad, Sebastian Wieczorek, Eric Verhulst, Belgium Altreonic, Andrea Baruzzo, Amir Alimohammad, Abel Marrero, Sebastian Wieczorek, Eric Verhulst, Belgium Altreonic (+43 others)
Complex distributed systems with heterogeneous interconnections operating at different speeds and based on various nano-and micro-technologies raise serious problems of testing, diagnosing, and debugging  ...  a series of events focusing on designing robust components and systems with testability for various features of behavior and interconnection.  ...  The project automo-tiveHMI is funded by the German Federal Ministry of Economics and Technology under grant number 01MS11007. Data Model Based Test Case Design  ... 

Proceedings of the 2021 Joint Workshop of the German Research Training Groups in Computer Science. May 31–June 1, 2021

Joint Workshop Of The German Research Training Groups In Computer Science, Erlangen May 31–June 1, 2021, Felix Freiling
Initiated in 1996 and run regularly since 2007, researchers of the German Research and Training Groups (RTGs) funded by the Deutsche Forschungsgemeinschaft (DFG) in the field of computer science meet annually  ...  The goal of these workshops is to foster an interchange of ideas and experiences in order to strengthen the connection within the German computer science community.  ...  Since BPMN is the defacto-standard of process modeling, we developed a role-based BPMN extension called RBPMN. RBPMN uses roles to increase the adaptability and expressiveness of process models.  ... 
doi:10.25593/opus4-fau-16426 fatcat:isoyq5lzdffxrdqzvkmfsnjgau

Dagstuhl Reports, Volume 6, Issue 5, May 2016, Complete Issue [article]

A possible answer is that reasons are (provided by) defaults and the logic of defaults tells us how reasons support conclusions.  ...  In this talk, a different question is raised: How do reasons support actions or conclusions, and what is the mechanism of support?  ...  models based on the historic data of process executions.  ... 
doi:10.4230/dagrep.6.5 fatcat:inw7y622xfac5mhgookw2wylme

Dependability Assessment of SOA-based Cyber-Physical Systems with Contracts and Model-Based Fault Injection [article]

Passerone Roberto
of SOA-based Cyber-Physical Systems.  ...  We will commit on modeling Cyber-Physical Systems of different sorts, first accounting for their cyber-physical aspects and then considering changes in topology typical of SOA.  ...  BMC techniques are distinguished in SAT-based and SMT-based.  ... 
doi:10.15168/11572_170973 fatcat:4obvdck4fre7la3low4cxo42pe

Electronic Markets and Auctions (Dagstuhl Seminar 13461) Computational Models of Language Meaning in Context (Dagstuhl Seminar 13462) Synchronous Programming (Dagstuhl Seminar 13471) Global Measurement Framework (Dagstuhl Seminar 13472) Unleashing Operational Process Mining (Dagstuhl Seminar 13481) Forensic Computing (Dagstuhl Seminar 13482)

Saul Greenberg, Kasper Hornbaek, Aaron Quigley, Harald Reiterer, Roman, Yishay Mansour, Benny Moldovanu, Noam Nisan, Berthold, Hans Kamp, Alessandro Lenci, James (+14 others)
2013 unpublished
Two EC FP7 research projects, Leone and mPlane, kindly supported the social event of the seminar.  ...  The seminar can be seen as a good starting point to identify the role of Proxemics in Human-Computer Interaction.  ...  formal systems (either logic-based models or full-blown psychological models of human minds) can capture private and public meanings.  ... 

Présentée et soutenue par : A formal approach for correct-by-construction system substitution Directeur(s) de Thèse : Rapporteurs : Membre(s) du jury

M Babin, Mathématiques, M Yamine, Ait Ameur, M Pantel, M Romanovsky, M Mery, Université Lorraine, M Pantel, Inp Toulouse
2017 unpublished
This proposal is first used to formalize substitution in the case of discrete systems applied to web services compensation and allowed modeling correct compensation.  ...  In order to model system substitution, the Event-B method has been selected as it is well suited to model such state-transition systems and it provides the benefits of refinement, proof and the availability  ...  Proof-based approaches Another category of formal techniques addressing formal modeling of hybrid systems is based on proof techniques and symbolic verification.  ... 

ICCGI 2011 The Sixth International Multi-Conference on Computing in the Global Information Technology Luxembourg City, Luxembourg ICCGI 2011 Editors ICCGI 2011 Committee ICCGI Advisory Chairs ICCGI 2011 Technical Program Committee

Constantin Paleologu, Hermann Kaindl, Tu-Wien Austria, Yasushi Kambayashi, Mary Luz, Mouronte López, S Ericsson, Krishna Spain, Hcl Murthy, America, Amir Razavi, José Rouillard (+43 others)
Foreword The Sixth International Multi-Conference on Computing in the Global Information Technology   unpublished
image processing, Internet and web technologies), towards secure, self-defendable, autonomous, privacy-safe, and context-aware scalable systems.  ...  Communications equipment manufacturers and applications developers are actively integrating IPv6 in their products based on market demands.  ...  We hope that ICCGI 2011 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of computing in the global  ... 

Digital Provenance Techniques and Applications

Amani M Abu Jabal
Provenance data are used to determine whether the policies meet the quality requirements. ProFact includes two approaches for policy analysis: structure-based and classification-based.  ...  Specifically, ProWS transforms data provenance into workflows and then organizes data into a set of indexes to support efficient querying mechanisms.  ...  Environment information helps in understanding the system context and performance in which processes were executed and data output were generated. Our model is security-aware.  ... 
doi:10.25394/pgs.12799934.v1 fatcat:uvdv3ieh5vc2pjnblvrghvyagi