34,253 research outputs found
Directed Multicut with linearly ordered terminals
Motivated by an application in network security, we investigate the following
"linear" case of Directed Mutlicut. Let be a directed graph which includes
some distinguished vertices . What is the size of the
smallest edge cut which eliminates all paths from to for all ? We show that this problem is fixed-parameter tractable when parametrized in
the cutset size via an algorithm running in time.Comment: 12 pages, 1 figur
A decidable policy language for history-based transaction monitoring
Online trading invariably involves dealings between strangers, so it is
important for one party to be able to judge objectively the trustworthiness of
the other. In such a setting, the decision to trust a user may sensibly be
based on that user's past behaviour. We introduce a specification language
based on linear temporal logic for expressing a policy for categorising the
behaviour patterns of a user depending on its transaction history. We also
present an algorithm for checking whether the transaction history obeys the
stated policy. To be useful in a real setting, such a language should allow one
to express realistic policies which may involve parameter quantification and
quantitative or statistical patterns. We introduce several extensions of linear
temporal logic to cater for such needs: a restricted form of universal and
existential quantification; arbitrary computable functions and relations in the
term language; and a "counting" quantifier for counting how many times a
formula holds in the past. We then show that model checking a transaction
history against a policy, which we call the history-based transaction
monitoring problem, is PSPACE-complete in the size of the policy formula and
the length of the history. The problem becomes decidable in polynomial time
when the policies are fixed. We also consider the problem of transaction
monitoring in the case where not all the parameters of actions are observable.
We formulate two such "partial observability" monitoring problems, and show
their decidability under certain restrictions
A Formal Framework for Concrete Reputation Systems
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction. However, while trust management is a component in security decision-making, many existing reputation-based trust-management systems provide no formal security-guarantees. In this extended abstract, we describe a mathematical framework for a class of simple reputation-based systems. In these systems, decisions about interaction are taken based on policies that are exact requirements on agents’ past histories. We present a basic declarative language, based on pure-past linear temporal logic, intended for writing simple policies. While the basic language is reasonably expressive (encoding e.g. Chinese Wall policies) we show how one can extend it with quantification and parameterized events. This allows us to encode other policies known from the literature, e.g., ‘one-out-of-k’. The problem of checking a history with respect to a policy is efficient for the basic language, and tractable for the quantified language when policies do not have too many variables
Dagstuhl Reports : Volume 1, Issue 2, February 2011
Online Privacy: Towards Informational Self-Determination on the Internet (Dagstuhl Perspectives Workshop 11061) : Simone Fischer-Hübner, Chris Hoofnagle, Kai Rannenberg, Michael Waidner, Ioannis Krontiris and Michael Marhöfer Self-Repairing Programs (Dagstuhl Seminar 11062) : Mauro Pezzé, Martin C. Rinard, Westley Weimer and Andreas Zeller Theory and Applications of Graph Searching Problems (Dagstuhl Seminar 11071) : Fedor V. Fomin, Pierre Fraigniaud, Stephan Kreutzer and Dimitrios M. Thilikos Combinatorial and Algorithmic Aspects of Sequence Processing (Dagstuhl Seminar 11081) : Maxime Crochemore, Lila Kari, Mehryar Mohri and Dirk Nowotka Packing and Scheduling Algorithms for Information and Communication Services (Dagstuhl Seminar 11091) Klaus Jansen, Claire Mathieu, Hadas Shachnai and Neal E. Youn
A Logical Framework for Reputation Systems
Reputation systems are meta systems that record, aggregate and distribute information about the past behaviour of principals in an application. Typically, these applications are large-scale open distributed systems where principals are virtually anonymous, and (a priori) have no knowledge about the trustworthiness of each other. Reputation systems serve two primary purposes: helping principals decide whom to trust, and providing an incentive for principals to well-behave. A logical policy-based framework for reputation systems is presented. In the framework, principals specify policies which state precise requirements on the past behaviour of other principals that must be fulfilled in order for interaction to take place. The framework consists of a formal model of behaviour, based on event structures; a declarative logical language for specifying properties of past behaviour; and efficient dynamic algorithms for checking whether a particular behaviour satisfies a property from the language. It is shown how the framework can be extended in several ways, most notably to encompass parameterized events and quantification over parameters. In an extended application, it is illustrated how the framework can be applied for dynamic history-based access control for safe execution of unknown and untrusted programs
Recommended from our members
A review of portfolio planning: Models and systems
In this chapter, we first provide an overview of a number of portfolio planning models
which have been proposed and investigated over the last forty years. We revisit the
mean-variance (M-V) model of Markowitz and the construction of the risk-return
efficient frontier. A piecewise linear approximation of the problem through a
reformulation involving diagonalisation of the quadratic form into a variable
separable function is also considered. A few other models, such as, the Mean
Absolute Deviation (MAD), the Weighted Goal Programming (WGP) and the
Minimax (MM) model which use alternative metrics for risk are also introduced,
compared and contrasted. Recently asymmetric measures of risk have gained in
importance; we consider a generic representation and a number of alternative
symmetric and asymmetric measures of risk which find use in the evaluation of
portfolios. There are a number of modelling and computational considerations which
have been introduced into practical portfolio planning problems. These include: (a)
buy-in thresholds for assets, (b) restriction on the number of assets (cardinality
constraints), (c) transaction roundlot restrictions. Practical portfolio models may also
include (d) dedication of cashflow streams, and, (e) immunization which involves
duration matching and convexity constraints. The modelling issues in respect of these
features are discussed. Many of these features lead to discrete restrictions involving
zero-one and general integer variables which make the resulting model a quadratic
mixed-integer programming model (QMIP). The QMIP is a NP-hard problem; the
algorithms and solution methods for this class of problems are also discussed. The
issues of preparing the analytic data (financial datamarts) for this family of portfolio
planning problems are examined. We finally present computational results which
provide some indication of the state-of-the-art in the solution of portfolio optimisation
problems
Cryptography from tensor problems
We describe a new proposal for a trap-door one-way function. The new proposal belongs to the "multivariate quadratic" family but the trap-door is different from existing methods, and is simpler
- …