55,149 Hits in 6.3 sec

Relating Hierarchy of Temporal Properties to Model Checking [chapter]

Ivana Černá, Radek Pelánek
2003 Lecture Notes in Computer Science  
A property is specifiable by LTL if and only if it is specifiable by a positive boolean combination of Model Checking and Hierarchy of Properties The model checking problem is to determine for a given  ...  Papers on specialised model checking algorithms either cover only part of the hierarchy or have a heuristic nature. Vardi and Kupferman [15] study the model checking of safety properties.  ... 
doi:10.1007/978-3-540-45138-9_26 fatcat:zllmtn2c7rekzgtde7xj5z4l2m

Spatio-temporal Schema Integration with Validation: A Practical Approach [chapter]

A. Sotnykova, N. Cullot, C. Vangenot
2005 Lecture Notes in Computer Science  
We shift the emphasis on automation from the a priori discovery to the a posteriori checking of the inter-schema mappings.  ...  In this paper, we focus on how to employ a reasoning engine to validate spatio-temporal schemas and describe where the reasoning engine is plugged into our integration methodology.  ...  In compliance to the MADS temporal abstract type hierarchy we define the temporal MADS-OWL class hierarchy as shown in Fig. 3 .  ... 
doi:10.1007/11575863_125 fatcat:wwundowwsjfppdy6x3y3dxl4py

Integration of Runtime Verification into Metamodeling for Simulation and Code Generation (Position Paper) [chapter]

Fernando Macias, Torben Scheffel, Malte Schmitz, Rui Wang
2016 Lecture Notes in Computer Science  
This unification allows to check correctness properties on different abstraction levels of the modeled system.  ...  Such integration is achieved by linking the elements of the system model with the atomic propositions of the temporal correctness properties used to specify monitors.  ...  The key concept of a linguistic extension for our work is the possibility to connect any type of element or set of elements in the modeling hierarchy to the model representing a temporal property.  ... 
doi:10.1007/978-3-319-46982-9_29 fatcat:sil5eq4fenfx7a3xwvufg2qcri

On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model [chapter]

Manachai Toahchoodee, Indrakshi Ray
2008 Lecture Notes in Computer Science  
The results obtained by analyzing the spatio-temporal access control model will enable the users of the model to make informed decisions. £  ...  For critical applications, a model for spatio-temporal-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause  ...  In this paper, we illustrate how to specify and analyze properties of a spatio-temporal role-based access control model.  ... 
doi:10.1007/978-3-540-70567-3_2 fatcat:xnbvvzrknvd5no3p2qm35ihlwy

Bounded model checking of infinite state systems

Tobias Schuele, Klaus Schneider
2006 Formal methods in system design  
Second, instead of directly unwinding temporal logic formulas, we use special translations to ω-automata that take into account the temporal logic hierarchy and maintain safety and liveness properties.  ...  The idea of BMC is to reduce the model checking problem to a satisfiability problem of the underlying base logic, so that sophisticated decision procedures can be utilized to check the resulting formula  ...  Acknowledgments We thank the reviewers for their detailed and valuable comments that helped us to substantially improve this paper.  ... 
doi:10.1007/s10703-006-0019-9 fatcat:ahphd3hr5zdhfaor3ak6mgkpyy

A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web

Fathieh Faghih, Morteza Amini, Rasool Jalili
2009 2009 IEEE International Symposium on Policies for Distributed Systems and Networks  
Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics  ...  This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses.  ...  Considering the Semantic Web properties, employing logic into the security model seems very promising.  ... 
doi:10.1109/policy.2009.15 dblp:conf/policy/FaghihAJ09 fatcat:u5uvvfe6kfg4dfidhmfxb5yssi

Why so Many Temporal Logics Climb up the Trees? [chapter]

Alexander Rabinovich, Shahar Maoz
2000 Lecture Notes in Computer Science  
We de ne an in nite hierarchy BTL k of temporal logics and prove its strictness.  ...  We show that for every logic based on a nite set of modalities, the complexity of model checking is linear both in the size of structure and the size of formula.  ...  Acknowledgments We would like to thank Yoram Hirshfeld for his insights that in uenced this research.  ... 
doi:10.1007/3-540-44612-5_58 fatcat:ns7vw4onx5axzihxxye4h3pzva


Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
2004 Proceedings of the 12th annual ACM international conference on Multimedia - MULTIMEDIA '04  
Second, the temporal constrains and IP address restrictions are modeled for the access control purpose.  ...  In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and Object-Relational Databases.  ...  Moreover, XML is also applied to organize all kinds of security related roles and policies.  ... 
doi:10.1145/1027527.1027631 dblp:conf/mm/ChenSZ04 fatcat:gxiosakekzcrdhe5w6gkc7z53e

Empowering Multilevel DSMLs with Integrated Runtime Verification [article]

Fernando Macías, Adrian Rutle, Volker Stolz, Torben Scheffel, Malte Schmitz
2020 arXiv   pre-print
This facilitates simulation of the system and checking against real-time temporal logic correctness properties.  ...  The semantics of the specified behaviour as well as the evaluation of correctness properties are given by model transformation rules.  ...  In order to relate both hierarchies and be able to specify temporal properties for the simulated scenario, we exploit the concept of supplementary hierarchy [MRS + 18].  ... 
arXiv:2005.11366v1 fatcat:nzvj3cgvpncrlgfcwlltka53ra

Specification and analysis of access control policies for mobile applications

Ramadan Abdunabi, Indrakshi Ray, Robert France
2013 Proceedings of the 18th ACM symposium on Access control models and technologies - SACMAT '13  
Thus, an application using our model can specify different types of spatio-temporal constraints.  ...  We need authorization policies that take into account time of access and location of the user in addition to the credentials of the user.  ...  Both hierarchies are supported by our model and the hierarchies are related by spatio-temporal constraints.  ... 
doi:10.1145/2462410.2463206 dblp:conf/sacmat/AbdunabiRF13 fatcat:ta3dueblingltml4m2e4qwfaia

Page 10269 of Mathematical Reviews Vol. , Issue 2004m [page]

2004 Mathematical Reviews  
We show that the question of checking many useful correctness properties for rings of all sizes can be reduced to checking them on ring of sizes up to a small cutoff size.  ...  We also relate the strictness of the variable hierarchy to the ques- tion whether the finite variable fragments satisfy the existential preservation theorem.”  ... 

Ensuring spatio-temporal access control for real-world applications

Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar
2009 Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09  
Thus, we need automated tools for verification of UML models. Towards this end, we propose that the UML models be converted to Alloy.  ...  We show how to convert the UML models to Alloy and verify the resulting model using the Alloy Analyzer which has embedded SAT-solvers.  ...  Saul Lorenzo in the Department of Microbiology, Immunology and Pathology at Colorado State University for their help in formulating the access control requirements for the Dengue Decision Support system  ... 
doi:10.1145/1542207.1542212 dblp:conf/sacmat/ToahchoodeeRAGB09 fatcat:7wnweba2tjggpgvpxtxnxutdum

Conceptual modeling in full computation-tree logic with sequence modal operator

Ken Kaneiwa, Norihiro Kamide
2011 International Journal of Intelligent Systems  
The validity, satisfiability, and model-checking problems of CTLS * are shown to be decidable. An illustrative example of biological taxonomy is presented using CTLS * formulas. 1.  ...  Ld (d ∈ SE) are mappings from S to the power set of AT (⊆ ATOM).  ...  The validity, satisfiability, and model-checking problems of CTLS * were shown to be decidable.  ... 
doi:10.1002/int.20486 fatcat:acb2k342dnhsnju6cxalv23y54

Geographical and temporal similarity measurement in location-based social networks

Zhengwu Yuan, Yanli Jiang, Győző Gidófalvi
2013 Proceedings of the Second ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems - MobiGIS '13  
and temporal aspects of their "check-ins".  ...  Using "check-in" data gathered from location-based social networks, this paper proposes to measure the similarity of users by considering the geographical and the temporal aspect of their geographical  ...  So, in this paper we aim to study the possibility of measuring the user similarity based on the geographical and temporal properties of check-in data from LBSN.  ... 
doi:10.1145/2534190.2534192 dblp:conf/gis/YuanJG13 fatcat:xfjsjall6bdofphmbbzf53uwy4

Page 5385 of Mathematical Reviews Vol. , Issue 94i [page]

1994 Mathematical Reviews  
The first family of characterizations concerns the safety-progress classification, which describes a hierarchy within the set of temporal properties.  ...  Sistla, On model-checking for fragments of y-calculus (385-396); E. M. Clarke, T. Filkorn and S. Jha [Somesh Jha], Exploiting symmetry in temporal logic model checking (450-462); E.  ... 
« Previous Showing results 1 — 15 out of 55,149 results