215 research outputs found
Monadic Second-Order Logic with Arbitrary Monadic Predicates
We study Monadic Second-Order Logic (MSO) over finite words, extended with
(non-uniform arbitrary) monadic predicates. We show that it defines a class of
languages that has algebraic, automata-theoretic and machine-independent
characterizations. We consider the regularity question: given a language in
this class, when is it regular? To answer this, we show a substitution property
and the existence of a syntactical predicate.
We give three applications. The first two are to give very simple proofs that
the Straubing Conjecture holds for all fragments of MSO with monadic
predicates, and that the Crane Beach Conjecture holds for MSO with monadic
predicates. The third is to show that it is decidable whether a language
defined by an MSO formula with morphic predicates is regular.Comment: Conference version: MFCS'14, Mathematical Foundations of Computer
Science Journal version: ToCL'17, Transactions on Computational Logi
The algebraic dichotomy conjecture for infinite domain Constraint Satisfaction Problems
We prove that an -categorical core structure primitively positively
interprets all finite structures with parameters if and only if some stabilizer
of its polymorphism clone has a homomorphism to the clone of projections, and
that this happens if and only if its polymorphism clone does not contain
operations , , satisfying the identity .
This establishes an algebraic criterion equivalent to the conjectured
borderline between P and NP-complete CSPs over reducts of finitely bounded
homogenous structures, and accomplishes one of the steps of a proposed strategy
for reducing the infinite domain CSP dichotomy conjecture to the finite case.
Our theorem is also of independent mathematical interest, characterizing a
topological property of any -categorical core structure (the existence
of a continuous homomorphism of a stabilizer of its polymorphism clone to the
projections) in purely algebraic terms (the failure of an identity as above).Comment: 15 page
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)
A widespread design approach in distributed applications based on the
service-oriented paradigm, such as web-services, consists of clearly separating
the enforcement of authorization policies and the workflow of the applications,
so that the interplay between the policy level and the workflow level is
abstracted away. While such an approach is attractive because it is quite
simple and permits one to reason about crucial properties of the policies under
consideration, it does not provide the right level of abstraction to specify
and reason about the way the workflow may interfere with the policies, and vice
versa. For example, the creation of a certificate as a side effect of a
workflow operation may enable a policy rule to fire and grant access to a
certain resource; without executing the operation, the policy rule should
remain inactive. Similarly, policy queries may be used as guards for workflow
transitions.
In this paper, we present a two-level formal verification framework to
overcome these problems and formally reason about the interplay of
authorization policies and workflow in service-oriented architectures. This
allows us to define and investigate some verification problems for SO
applications and give sufficient conditions for their decidability.Comment: 16 pages, 4 figures, full version of paper at Symposium on Secure
Computing (SecureCom09
Nonstandard Methods in Ramsey Theory and Combinatorial Number Theory
The goal of this present manuscript is to introduce the reader to the
nonstandard method and to provide an overview of its most prominent
applications in Ramsey theory and combinatorial number theory.Comment: 126 pages. Comments welcom
- …