An Application of Partial Evaluation of Communicating Processes to System Security

نویسنده

  • Masaki Murakami
چکیده

This paper presents a framework that extends a partial evaluation method for transformational programs to a method for reactive CSP processes. Temporal logic formulas are used to represent constraints on the sets of the sequences of communication actions executed by the processes. We present a set of simple rules for specializing processes with temporal formulas which contain X(next)-operators and/or G(invariant)operators. We show the soundness of the rules. Our partial evaluation method specializes reactive processes with the specifications of their environments. Furthermore, we present an example of an application of our partial evaluation method to improve the security of concurrent systems..

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud manufacturing system

Cloud manufacturing is defined as a relationship between the consumer and a flexible array of production services, managed by an intervening architecture that can match service providers to product and manufacturing processes Cloud manufacturing definitions typically make explicit or imply three groups of actors: consumers, who request and use cloud manufacturing processes; application provider...

متن کامل

Efficiency evaluation of wheat farming: a network data envelopment analysis approach

Traditional data envelopment analysis (DEA) models deal with measurement of relative efficiency of decision making units (DMUs) in which multiple-inputs consumed to produce multiple-outputs. One of the drawbacks of these models is neglecting internal processes of each system, which may have intermediate products and/or independent inputs and/or outputs. In this paper some methods which are usab...

متن کامل

Evaluation of Outpatient Electronic Prescription System Capabilities from the Perspective of Physicians in Specialized Polyclinics of Urmia Social Security Organization

Background and Aim: Electronic prescription systems can improve patient safety and the quality of health care services. These systems must provide the capabilities required to reduce medical errors and enhance the performance of health care providers. The purpose of this study is to evaluate the capabilities of the e-prescription system from the perspective of physicians in the polyclinics of t...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012