6 research outputs found

    A Rewriting Framework for Activities Subject to Regulations

    Get PDF
    Activities such as clinical investigations or financial processes are subject to regulations to ensure quality of results and avoid negative consequences. Regulations may be imposed by multiple governmental agencies as well as by institutional policies and protocols. Due to the complexity of both regulations and activities there is great potential for violation due to human error, misunderstanding, or even intent. Executable formal models of regulations, protocols, and activities can form the foundation for automated assistants to aid planning, monitoring, and compliance checking. We propose a model based on multiset rewriting where time is discrete and is specified by timestamps attached to facts. Actions, as well as initial, goal and critical states may be constrained by means of relative time constraints. Moreover, actions may have non-deterministic effects, that is, they may have different outcomes whenever applied. We demonstrate how specifications in our model can be straightforwardly mapped to the rewriting logic language Maude, and how one can use existing techniques to improve performance. Finally, we also determine the complexity of the plan compliance problem, that is, finding a plan that leads from an initial state to a desired goal state without reaching any undesired critical state. We consider all actions to be balanced, that is, their pre and post-conditions have the same number of facts. Under this assumption on actions, we show that the plan compliance problem is PSPACE-complete when all actions have only deterministic effects and is EXPTIME-complete when actions may have non-deterministic effects

    Determining the degree of collaboration readiness for regional transportation systems: The formulation of a model

    Get PDF
    The purpose of this study was to identify factors, both governmental and universal, that indicate the degree of readiness and/or potential for success of a government collaborative project in the field of regional rapid mass transportation. The study is important because collaboration has been recognized as a tool that can help address such challenges as demonstrating the responsible use of limited resources, anticipating converging technologies, and reacting to rapidly changing technologies. There was very limited availability of tools to assist in ensuring successful collaborations. Although tools have been developed that gauge the degree of collaborative readiness of a project, such tools do not address the specific needs of a regional transportation project. A Modified Delphi approach was used to address the research questions, and included a panel of experts with extensive experience in the field of the research phenomenon. The research questions addressed the identification of the factors that impact successful collaborations for governmental entities and whether or not these factors could be incorporated into a model that when used would increase the likelihood of success of a regional mass transportation project. This research yielded a list of factors that enhance the chances of success of such projects and proposes a model designed to guide the leaders of potential regional transportation projects. The suggestions for those planning a regional transportation project include: (1) when creating regional transit authorities, consider the factors identified in this study, (2) use the factors to track the progress of the collaborative project during the preliminary work phase, and (3) institute a policy for the creation of a regional advisory board consisting of local representation, and (4) use the factors identified by this study to guide the policy development phase as supportive of a Regional Transit Authority. Future researchers using a Delphi approach should consider working with a membership-oriented organization specific to their research study rather than people with specific job titles

    Time, computational complexity, and probability in the analysis of distance-bounding protocols

    Get PDF
    Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols. This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time. We show that there are attacks that can be found by models using dense time, but not when using discrete time. We illustrate this with an attack that can be carried out on most Distance Bounding Protocols. In this attack, one exploits the execution delay of instructions during one clock cycle to convince a verifier that he is in a location different from his actual position. We additionally present a probabilistic analysis of this novel attack. As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols. We introduce Circle-Configurations and show that they can be used to symbolically solve the reachability problem for our model, and show that for the important class of balanced theories the reachability problem is PSPACE-complete. We also show how our model can be implemented using the computational rewriting tool Maude, the machinery that automatically searches for such attacks

    Time, computational complexity, and probability in the analysis of distance-bounding protocols

    Get PDF
    Many security protocols rely on the assumptions on the physical properties in which its protocol sessions will be carried out. For instance, Distance Bounding Protocols take into account the round trip time of messages and the transmission velocity to infer an upper bound of the distance between two agents. We classify such security protocols as Cyber-Physical. Time plays a key role in design and analysis of many of these protocols. This paper investigates the foundational differences and the impacts on the analysis when using models with discrete time and models with dense time. We show that there are attacks that can be found by models using dense time, but not when using discrete time. We illustrate this with an attack that can be carried out on most Distance Bounding Protocols. In this attack, one exploits the execution delay of instructions during one clock cycle to convince a verifier that he is in a location different from his actual position. We additionally present a probabilistic analysis of this novel attack. As a formal model for representing and analyzing Cyber-Physical properties, we propose a Multiset Rewriting model with dense time suitable for specifying cyber-physical security protocols. We introduce Circle-Configurations and show that they can be used to symbolically solve the reachability problem for our model, and show that for the important class of balanced theories the reachability problem is PSPACE-complete. We also show how our model can be implemented using the computational rewriting tool Maude, the machinery that automatically searches for such attacks
    corecore