An Application of Partial Evaluation of Communicating Processes to System Security
نویسنده
چکیده
This paper presents a framework that extends a partial evaluation method for transformational programs to a method for reactive CSP processes. Temporal logic formulas are used to represent constraints on the sets of the sequences of communication actions executed by the processes. We present a set of simple rules for specializing processes with temporal formulas which contain X(next)-operators and/or G(invariant)operators. We show the soundness of the rules. Our partial evaluation method specializes reactive processes with the specifications of their environments. Furthermore, we present an example of an application of our partial evaluation method to improve the security of concurrent systems..
منابع مشابه
Cloud manufacturing system
Cloud manufacturing is defined as a relationship between the consumer and a flexible array of production services, managed by an intervening architecture that can match service providers to product and manufacturing processes Cloud manufacturing definitions typically make explicit or imply three groups of actors: consumers, who request and use cloud manufacturing processes; application provider...
متن کاملEfficiency evaluation of wheat farming: a network data envelopment analysis approach
Traditional data envelopment analysis (DEA) models deal with measurement of relative efficiency of decision making units (DMUs) in which multiple-inputs consumed to produce multiple-outputs. One of the drawbacks of these models is neglecting internal processes of each system, which may have intermediate products and/or independent inputs and/or outputs. In this paper some methods which are usab...
متن کاملEvaluation of Outpatient Electronic Prescription System Capabilities from the Perspective of Physicians in Specialized Polyclinics of Urmia Social Security Organization
Background and Aim: Electronic prescription systems can improve patient safety and the quality of health care services. These systems must provide the capabilities required to reduce medical errors and enhance the performance of health care providers. The purpose of this study is to evaluate the capabilities of the e-prescription system from the perspective of physicians in the polyclinics of t...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کامل