A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Relating Hierarchy of Temporal Properties to Model Checking
[chapter]
2003
Lecture Notes in Computer Science
A property is specifiable by LTL if and only if it is specifiable by a positive boolean combination of
Model Checking and Hierarchy of Properties The model checking problem is to determine for a given ...
Papers on specialised model checking algorithms either cover only part of the hierarchy or have a heuristic nature. Vardi and Kupferman [15] study the model checking of safety properties. ...
doi:10.1007/978-3-540-45138-9_26
fatcat:zllmtn2c7rekzgtde7xj5z4l2m
Spatio-temporal Schema Integration with Validation: A Practical Approach
[chapter]
2005
Lecture Notes in Computer Science
We shift the emphasis on automation from the a priori discovery to the a posteriori checking of the inter-schema mappings. ...
In this paper, we focus on how to employ a reasoning engine to validate spatio-temporal schemas and describe where the reasoning engine is plugged into our integration methodology. ...
In compliance to the MADS temporal abstract type hierarchy we define the temporal MADS-OWL class hierarchy as shown in Fig. 3 . ...
doi:10.1007/11575863_125
fatcat:wwundowwsjfppdy6x3y3dxl4py
Integration of Runtime Verification into Metamodeling for Simulation and Code Generation (Position Paper)
[chapter]
2016
Lecture Notes in Computer Science
This unification allows to check correctness properties on different abstraction levels of the modeled system. ...
Such integration is achieved by linking the elements of the system model with the atomic propositions of the temporal correctness properties used to specify monitors. ...
The key concept of a linguistic extension for our work is the possibility to connect any type of element or set of elements in the modeling hierarchy to the model representing a temporal property. ...
doi:10.1007/978-3-319-46982-9_29
fatcat:sil5eq4fenfx7a3xwvufg2qcri
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
[chapter]
2008
Lecture Notes in Computer Science
The results obtained by analyzing the spatio-temporal access control model will enable the users of the model to make informed decisions. £ ...
For critical applications, a model for spatio-temporal-based access control is needed that increases the security of the application and ensures that the location information cannot be exploited to cause ...
In this paper, we illustrate how to specify and analyze properties of a spatio-temporal role-based access control model. ...
doi:10.1007/978-3-540-70567-3_2
fatcat:xnbvvzrknvd5no3p2qm35ihlwy
Bounded model checking of infinite state systems
2006
Formal methods in system design
Second, instead of directly unwinding temporal logic formulas, we use special translations to ω-automata that take into account the temporal logic hierarchy and maintain safety and liveness properties. ...
The idea of BMC is to reduce the model checking problem to a satisfiability problem of the underlying base logic, so that sophisticated decision procedures can be utilized to check the resulting formula ...
Acknowledgments We thank the reviewers for their detailed and valuable comments that helped us to substantially improve this paper. ...
doi:10.1007/s10703-006-0019-9
fatcat:ahphd3hr5zdhfaor3ak6mgkpyy
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web
2009
2009 IEEE International Symposium on Policies for Distributed Systems and Networks
Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics ...
This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses. ...
Considering the Semantic Web properties, employing logic into the security model seems very promising. ...
doi:10.1109/policy.2009.15
dblp:conf/policy/FaghihAJ09
fatcat:u5uvvfe6kfg4dfidhmfxb5yssi
Why so Many Temporal Logics Climb up the Trees?
[chapter]
2000
Lecture Notes in Computer Science
We de ne an in nite hierarchy BTL k of temporal logics and prove its strictness. ...
We show that for every logic based on a nite set of modalities, the complexity of model checking is linear both in the size of structure and the size of formula. ...
Acknowledgments We would like to thank Yoram Hirshfeld for his insights that in uenced this research. ...
doi:10.1007/3-540-44612-5_58
fatcat:ns7vw4onx5axzihxxye4h3pzva
SMARXO
2004
Proceedings of the 12th annual ACM international conference on Multimedia - MULTIMEDIA '04
Second, the temporal constrains and IP address restrictions are modeled for the access control purpose. ...
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and Object-Relational Databases. ...
Moreover, XML is also applied to organize all kinds of security related roles and policies. ...
doi:10.1145/1027527.1027631
dblp:conf/mm/ChenSZ04
fatcat:gxiosakekzcrdhe5w6gkc7z53e
Empowering Multilevel DSMLs with Integrated Runtime Verification
[article]
2020
arXiv
pre-print
This facilitates simulation of the system and checking against real-time temporal logic correctness properties. ...
The semantics of the specified behaviour as well as the evaluation of correctness properties are given by model transformation rules. ...
In order to relate both hierarchies and be able to specify temporal properties for the simulated scenario, we exploit the concept of supplementary hierarchy [MRS + 18]. ...
arXiv:2005.11366v1
fatcat:nzvj3cgvpncrlgfcwlltka53ra
Specification and analysis of access control policies for mobile applications
2013
Proceedings of the 18th ACM symposium on Access control models and technologies - SACMAT '13
Thus, an application using our model can specify different types of spatio-temporal constraints. ...
We need authorization policies that take into account time of access and location of the user in addition to the credentials of the user. ...
Both hierarchies are supported by our model and the hierarchies are related by spatio-temporal constraints. ...
doi:10.1145/2462410.2463206
dblp:conf/sacmat/AbdunabiRF13
fatcat:ta3dueblingltml4m2e4qwfaia
Page 10269 of Mathematical Reviews Vol. , Issue 2004m
[page]
2004
Mathematical Reviews
We show that the question of checking many useful correctness properties for rings of all sizes can be reduced to checking them on ring of sizes up to a small cutoff size. ...
We also relate the strictness of the variable hierarchy to the ques- tion whether the finite variable fragments satisfy the existential preservation theorem.” ...
Ensuring spatio-temporal access control for real-world applications
2009
Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09
Thus, we need automated tools for verification of UML models. Towards this end, we propose that the UML models be converted to Alloy. ...
We show how to convert the UML models to Alloy and verify the resulting model using the Alloy Analyzer which has embedded SAT-solvers. ...
Saul Lorenzo in the Department of Microbiology, Immunology and Pathology at Colorado State University for their help in formulating the access control requirements for the Dengue Decision Support system ...
doi:10.1145/1542207.1542212
dblp:conf/sacmat/ToahchoodeeRAGB09
fatcat:7wnweba2tjggpgvpxtxnxutdum
Conceptual modeling in full computation-tree logic with sequence modal operator
2011
International Journal of Intelligent Systems
The validity, satisfiability, and model-checking problems of CTLS * are shown to be decidable. An illustrative example of biological taxonomy is presented using CTLS * formulas. 1. ...
Ld (d ∈ SE) are mappings from S to the power set of AT (⊆ ATOM). ...
The validity, satisfiability, and model-checking problems of CTLS * were shown to be decidable. ...
doi:10.1002/int.20486
fatcat:acb2k342dnhsnju6cxalv23y54
Geographical and temporal similarity measurement in location-based social networks
2013
Proceedings of the Second ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems - MobiGIS '13
and temporal aspects of their "check-ins". ...
Using "check-in" data gathered from location-based social networks, this paper proposes to measure the similarity of users by considering the geographical and the temporal aspect of their geographical ...
So, in this paper we aim to study the possibility of measuring the user similarity based on the geographical and temporal properties of check-in data from LBSN. ...
doi:10.1145/2534190.2534192
dblp:conf/gis/YuanJG13
fatcat:xfjsjall6bdofphmbbzf53uwy4
Page 5385 of Mathematical Reviews Vol. , Issue 94i
[page]
1994
Mathematical Reviews
The first family of characterizations concerns the safety-progress classification, which describes a hierarchy within the set of temporal properties. ...
Sistla, On model-checking for fragments of y-calculus (385-396); E. M. Clarke, T. Filkorn and S. Jha [Somesh Jha], Exploiting symmetry in temporal logic model checking (450-462); E. ...
« Previous
Showing results 1 — 15 out of 55,149 results