7,211 research outputs found
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
As computation spreads from computers to networks of computers, and migrates
into cyberspace, it ceases to be globally programmable, but it remains
programmable indirectly: network computations cannot be controlled, but they
can be steered by local constraints on network nodes. The tasks of
"programming" global behaviors through local constraints belong to the area of
security. The "program particles" that assure that a system of local
interactions leads towards some desired global goals are called security
protocols. As computation spreads beyond cyberspace, into physical and social
spaces, new security tasks and problems arise. As networks are extended by
physical sensors and controllers, including the humans, and interlaced with
social networks, the engineering concepts and techniques of computer security
blend with the social processes of security. These new connectors for
computational and social software require a new "discipline of programming" of
global behaviors through local constraints. Since the new discipline seems to
be emerging from a combination of established models of security protocols with
older methods of procedural programming, we use the name procedures for these
new connectors, that generalize protocols. In the present paper we propose
actor-networks as a formal model of computation in heterogenous networks of
computers, humans and their devices; and we introduce Procedure Derivation
Logic (PDL) as a framework for reasoning about security in actor-networks. On
the way, we survey the guiding ideas of Protocol Derivation Logic (also PDL)
that evolved through our work in security in last 10 years. Both formalisms are
geared towards graphic reasoning and tool support. We illustrate their workings
by analysing a popular form of two-factor authentication, and a multi-channel
device pairing procedure, devised for this occasion.Comment: 32 pages, 12 figures, 3 tables; journal submission; extended
references, added discussio
AC-Conductance through an Interacting Quantum Dot
We investigate the linear ac-conductance for tunneling through an arbitrary
interacting quantum dot in the presence of a finite dc-bias. In analogy to the
well-known Meir-Wingreen formula for the dc case, we are able to derive a
general formula for the ac-conductance. It can be expressed entirely in terms
of local correlations on the quantum dot, in the form of a Keldysh block
diagram with four external legs. We illustrate the use of this formula as a
starting point for diagrammatic calculations by considering the ac-conductance
of the noninteracting resonant level model and deriving the result for the
lowest order of electron-phonon coupling. We show how known results are
recovered in the appropriate limits.Comment: 4+ pages, 4 figure
Visual Specification Patterns
Visual modelling notations such as constraint diagrams can be used for the behavioural specifications of software components. This includes specifying invariants on classes or types and preconditions and postconditions of operations. However, one current problem in specifying components comes from the fact that editing constraints manually is time consuming and error prone and so we may adopt a pattern-based approach to alleviate this problem. One way to simplify the
definition of constraints is to identify and capture those recurring constraints in the form of visual specification patterns. Such patterns would facilitate the automatic generation of diagrammatic constraints. This paper identifies some specification
patterns that frequently occur when specifying software components and provides a diagrammatic representation of these patterns. This will form the basis of a library of specification patterns that could be used in the context of tools. We also show how such patterns can be combined in order to specify more complex constraints
Some Results for Drawing Area Proportional Venn3 With Convex Curves
Many data sets are visualized effectively with area proportional Venn diagrams, where the area of the regions is in proportion to a defined specification. In particular, Venn diagrams with three intersecting curves are considered useful for visualizing data in many applications, including bioscience, ecology and medicine. To ease the understanding of such diagrams, using restricted nice shapes for the curves is considered beneficial. Many research questions on the use of such diagrams are still open. For instance, a general solution to the question of when given area specifications can be represented by Venn3 using convex curves is still unknown. In this paper we study symmetric Venn3 drawn with convex curves and show that there is a symmetric area specification that cannot be represented with such a diagram. In addition, by using symmetric diagrams drawn with polygons, we show that, if area specifications are restricted so that the double intersection areas are no greater than the triple intersection area then the specification can be drawn with convex curves. We also propose a construction that allows the representation of some area specifications when the double intersection areas are greater than the triple intersection area. Finally, we present some open questions on the topic
- …