A Formal Model for Verification of Dynamic Consis tency of KBSs
نویسنده
چکیده
K e y w o r d s F o r m a l models for KBS's, Formal approach to verification, Algebraic logic. 1. I N T R O D U C T I O N T h e a i m o f t h e p r e s e n t p a p e r is t o p r o p o s e a t r a n s l a t i o n of t h e c o n c e p t s o f f o r w a r d a n d b a c k w a r d r e a s o n i n g c o n s i s t e n c y of K n o w l e d g e B a s e d S y s t e m s ( K B S s ) in to a t h e o r e t i c a l m e t a l a n g u a g e b a s e d o n H a l m o s [1] a n d L e b l a n c ' s [2] " M o n a d i c a n d P o l y a d i c A l g e b r a s . " A few p a p e r s d e a l i n g w i t h t h e We thank the members of the teams of the ESPRIT project VALID, for their help. Our work has been supported by the Spanish Commission for Science CICYT. We also thank the anonymous referee of this paper for his most valuable comments. *Author to whom all correspondence should be addressed. 81 Typeset by ,4A/cS-TEX
منابع مشابه
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملAn Algebraic Approach to Refinement of KBS Specification
This paper reports on an ongoing experiment whose main purpose is to investigate to what extent object orientation might solve the existing or potential problems inherent in the verification and validation of KBSs, when these investigations are carried out at a level higher than the implementation level. Techniques for specifying and reasoning about properties of KBSs have been described in pre...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملFormal Method in Service Composition in Heath Care Systems
One of the areas with greatest needs having available information at the right moment and with high accuracy is healthcare. Right information at right time saves lives. Healthcare is a vital domain which needs high processing power for high amounts of data. Due to the critical and the special characteristics of these systems, formal methods are used for specification, description and verificati...
متن کاملAssessing KBS Construction and Verification Techniques for Knowledge Management Systems
The aim of this research note is to identify some critical areas of knowledge management that may benefit from research results in the development and verification of knowledge-based systems (KBSs). While knowledge management efforts are usually much broader and more loosely defined than traditional KBSs, there are many activities that are analogous to those required for KBSs. In particular, we...
متن کامل