33,311 research outputs found

    Verifying Security Properties in Unbounded Multiagent Systems

    Get PDF
    We study the problem of analysing the security for an unbounded number of concurrent sessions of a cryptographic protocol. Our formal model accounts for an arbitrary number of agents involved in a protocol-exchange which is subverted by a Dolev-Yao attacker. We define the parameterised model checking problem with respect to security requirements expressed in temporal-epistemic logics. We formulate sufficient conditions for solving this problem, by analysing several finite models of the system. We primarily explore authentication and key-establishment as part of a larger class of protocols and security requirements amenable to our methodology. We introduce a tool implementing the technique, and we validate it by verifying the NSPK and ASRPC protocols

    Design & development of a simulation model to analyse scheduling rules in an FMS in a virtual manufacturing environment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Technology in Manufacturing and Industrial Technology at Massey University

    Get PDF
    Due to the rapid changes in the needs of the customer for new products, the future manufacturing systems must cope with these changes. Hence, the need for the manufacturing systems to support these changes in the products with shorter lead times within a single manufacturing facility. The Virtual Manufacturing System (VMS) is one concept which can assist in meeting these demands. The VMS concept enables the manufacturing system designers to emulate and test the performance of the future manufacturing systems. This research has given an overview of the new concepts of Virtual Manufacturing Systems and Virtual Manufacturing in general. A Virtual Reality Software tool has been used to realise the VMS concept. A Virtual Manufacturing Environment representing a Flexible Manufacturing System (FMS) has been modelled. A simulation control language is employed for developing simulation control logics and decision making control logics for the development of the FMS model. The modelled FMS is implemented and tested through simulation experiments. The testing is done by analysing the traditional scheduling rules in a manufacturing facility. Average Machine Utilisation, Mean Flow Time, Average Queue Lengths and the System Production Rate are measured as the System Performance Measures for the evaluation of the scheduling rules. This research has identified that the Virtual Manufacturing Software is a powerful tool which can identify optimum configurations and highlight potential problems before a final and expensive manufacturing system is established physically

    Globally reasoning about localised security policies in distributed systems

    Get PDF
    In this report, we aim at establishing proper ways for model checking the global security of distributed systems, which are designed consisting of set of localised security policies that enforce specific issues about the security expected. The systems are formally specified following a syntax, defined in detail in this report, and their behaviour is clearly established by the Semantics, also defined in detail in this report. The systems include the formal attachment of security policies into their locations, whose intended interactions are trapped by the policies, aiming at taking access control decisions of the system, and the Semantics also takes care of this. Using the Semantics, a Labelled Transition System (LTS) can be induced for every particular system, and over this LTS some model checking tasks could be done. We identify how this LTS is indeed obtained, and propose an alternative way of model checking the not-yet-induced LTS, by using the system design directly. This may lead to over-approximation thereby producing imprecise, though safe, results. We restrict ourselves to finite systems, in the sake of being certain about the decidability of the proposed method. To illustrate the usefulness and validity of our proposal, we present 2 small case-study-like examples, where we show how the system can be specified, which policies could be added to it, and how to decide if the desired global security property is met. Finally, an Appendix is given for digging deeply into how a tool for automatically performing this task is being built, including some implementation issues. The tool takes advantage of the proposed method, and given some system and some desired global security property, it safely (i.e. without false positives) ensures satisfaction of it

    MetTeL: A Generic Tableau Prover.

    Get PDF

    Understanding Opportunities in Social Entrepreneurship: A Critical Realist Abstraction

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.This paper extends social entrepreneurship (SE) research by drawing upon a critical realist perspective to analyse dynamic structure/agency relations in SE opportunity emergence, illustrated by empirical evidence. Our findings demonstrate an agential aspect (opportunity actualisation following a path-dependent seeding-growing-shaping process) and a structural aspect (institutional, cognitive and embedded structures necessary for SE opportunity emergence) related to SE opportunities. These structures provide three boundary conditions for SE agency: institutional discrimination, an SE belief system and social feasibility. Within this paper, we develop a novel theoretical framework to analyse SE opportunities plus, an applicable tool to advance related empirical research

    Model Driven Mutation Applied to Adaptative Systems Testing

    Get PDF
    Dynamically Adaptive Systems modify their behav- ior and structure in response to changes in their surrounding environment and according to an adaptation logic. Critical sys- tems increasingly incorporate dynamic adaptation capabilities; examples include disaster relief and space exploration systems. In this paper, we focus on mutation testing of the adaptation logic. We propose a fault model for adaptation logics that classifies faults into environmental completeness and adaptation correct- ness. Since there are several adaptation logic languages relying on the same underlying concepts, the fault model is expressed independently from specific adaptation languages. Taking benefit from model-driven engineering technology, we express these common concepts in a metamodel and define the operational semantics of mutation operators at this level. Mutation is applied on model elements and model transformations are used to propagate these changes to a given adaptation policy in the chosen formalism. Preliminary results on an adaptive web server highlight the difficulty of killing mutants for adaptive systems, and thus the difficulty of generating efficient tests.Comment: IEEE International Conference on Software Testing, Verification and Validation, Mutation Analysis Workshop (Mutation 2011), Berlin : Allemagne (2011

    Towards a Maude tool for model checking temporal graph properties

    Get PDF
    We present our prototypical tool for the verification of graph transformation systems. The major novelty of our tool is that it provides a model checker for temporal graph properties based on counterpart semantics for quantified m-calculi. Our tool can be considered as an instantiation of our approach to counterpart semantics which allows for a neat handling of creation, deletion and merging in systems with dynamic structure. Our implementation is based on the object-based machinery of Maude, which provides the basics to deal with attributed graphs. Graph transformation systems are specified with term rewrite rules. The model checker evaluates logical formulae of second-order modal m-calculus in the automatically generated CounterpartModel (a sort of unfolded graph transition system) of the graph transformation system under study. The result of evaluating a formula is a set of assignments for each state, associating node variables to actual nodes
    corecore