4 research outputs found

    Modularity for Security-Sensitive Workflows

    Full text link
    An established trend in software engineering insists on using components (sometimes also called services or packages) to encapsulate a set of related functionalities or data. By defining interfaces specifying what functionalities they provide or use, components can be combined with others to form more complex components. In this way, IT systems can be designed by mostly re-using existing components and developing new ones to provide new functionalities. In this paper, we introduce a notion of component and a combination mechanism for an important class of software artifacts, called security-sensitive workflows. These are business processes in which execution constraints on the tasks are complemented with authorization constraints (e.g., Separation of Duty) and authorization policies (constraining which users can execute which tasks). We show how well-known workflow execution patterns can be simulated by our combination mechanism and how authorization constraints can also be imposed across components. Then, we demonstrate the usefulness of our notion of component by showing (i) the scalability of a technique for the synthesis of run-time monitors for security-sensitive workflows and (ii) the design of a plug-in for the re-use of workflows and related run-time monitors inside an editor for security-sensitive workflows

    Formal Relationships Between Geometrical and Classical Models for Concurrency

    Get PDF
    A wide variety of models for concurrent programs has been proposed during the past decades, each one focusing on various aspects of computations: trace equivalence, causality between events, conflicts and schedules due to resource accesses, etc. More recently, models with a geometrical flavor have been introduced, based on the notion of cubical set. These models are very rich and expressive since they can represent commutation between any bunch of events, thus generalizing the principle of true concurrency. While they seem to be very promising - because they make possible the use of techniques from algebraic topology in order to study concurrent computations - they have not yet been precisely related to the previous models, and the purpose of this paper is to fill this gap. In particular, we describe an adjunction between Petri nets and cubical sets which extends the previously known adjunction between Petri nets and asynchronous transition systems by Nielsen and Winskel

    A new approach to the system reliability analysis using reverse Petri nets

    Get PDF
    Анализа стабла нСисправности (АБН) јС Ρ‚Π΅Ρ…Π½ΠΈΠΊΠ° Π·Π° Π°Π½Π°Π»ΠΈΠ·Ρƒ поузданости која сС користи Π·Π° ΠΎΠ΄Ρ€Π΅Ρ’ΠΈΠ²Π°ΡšΠ΅ ΡƒΠ·Ρ€ΠΎΠΊΠ° ΠΈ Π²Π΅Ρ€ΠΎΠ²Π°Ρ‚Π½ΠΎΡ›Π΅ ΠΎΡ‚ΠΊΠ°Π·Π° систСма. АБН јС Π±Π°Π·ΠΈΡ€Π°Π½Π° Π½Π° стаблу нСисправности (БН), Π³Ρ€Π°Ρ„ΠΈΡ‡ΠΊΠΎΠΌ ΠΌΠΎΠ΄Π΅Π»Ρƒ који користи Π»ΠΎΠ³ΠΈΡ‡ΠΊΠ° ΠΊΠΎΠ»Π° ΠΈ ΠΎΡ‚ΠΊΠ°Π·Π½Π΅ Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜Π΅ Π·Π° ΠΏΡ€Π΅Π΄ΡΡ‚Π°Π²Ρ™Π°ΡšΠ΅ ΡƒΠ·Ρ€ΠΎΡ‡Π½ΠΎ-послСдичних Π²Π΅Π·Π° ΠΈΠ·ΠΌΠ΅Ρ’Ρƒ Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜Π° који ΠΏΡ€Π΅Ρ‚Ρ…ΠΎΠ΄Π΅ ΠΎΡ‚ΠΊΠ°Π·Ρƒ систСма. ΠšΠ²Π°Π»ΠΈΡ‚Π°Ρ‚ΠΈΠ²Π½ΠΈ Π΄Π΅ΠΎ АБН ΡΠ°ΡΡ‚ΠΎΡ˜ΠΈ сС Ρƒ ΠΎΠ΄Ρ€Π΅Ρ’ΠΈΠ²Π°ΡšΡƒ ΠΌΠΈΠ½ΠΈΠΌΠ°Π»Π½ΠΈΡ… скупова прСсСка. Π‘ΠΊΡƒΠΏ прСсСка јС скуп ΠΏΡ€ΠΈΠΌΠ°Ρ€Π½ΠΈΡ… Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜Π° који, ΠΊΠ°Π΄Π° сС Π΄ΠΎΠ³ΠΎΠ΄Π΅ истоврСмСно, Π΄ΠΎΠ²ΠΎΠ΄Π΅ Π΄ΠΎ ΠΎΡ‚ΠΊΠ°Π·Π° ситСма. Минимални скуп прСсСка (минипрСсСк) јС скуп прСсСка који јС Ρ€Π΅Π΄ΡƒΠΊΠΎΠ²Π°Π½ Π½Π° ΠΌΠΈΠ½ΠΈΠΌΠ°Π»Π½ΠΈ Π±Ρ€ΠΎΡ˜ Π΅Π»Π΅ΠΌΠ΅Π½Π°Ρ‚Π° који ΠΈΠ·Π°Π·ΠΈΠ²Π°Ρ˜Ρƒ ΠΎΡ‚ΠΊΠ°Π· систСма. Π£ овој Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜ΠΈ јС ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π° Π½ΠΎΠ²Π° ΠΌΠ΅Ρ‚ΠΎΠ΄Π° Π·Π° ΠΎΠ΄Ρ€Π΅Ρ’ΠΈΠ²Π°ΡšΠ΅ минипрСсСка ΠΊΠΎΡ…Π΅Ρ€Π΅Π½Ρ‚Π½ΠΎΠ³ БН, БН којС садрТи само И ΠΈ Π˜Π›Π˜ Π»ΠΎΠ³ΠΈΡ‡ΠΊΠ° ΠΊΠΎΠ»Π°, са Π²ΠΈΡˆΠ΅ΡΡ‚Ρ€ΡƒΠΊΠΈΠΌ Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜ΠΈΠΌΠ°. ΠœΠ΅Ρ‚ΠΎΠ΄Π° јС заснована Π½Π° посСбном Ρ‚ΠΈΠΏΡƒ ΠŸΠ΅Ρ‚Ρ€ΠΈΡ˜Π΅Π²ΠΈΡ… ΠΌΡ€Π΅ΠΆΠ° – ΠΈΠ½Π²Π΅Ρ€Π·Π½ΠΈΠΌ ΠŸΠ΅Ρ‚Ρ€ΠΈΡ˜Π΅Π²ΠΈΠΌ ΠΌΡ€Π΅ΠΆΠ°ΠΌΠ°. ΠŸΡ€Π²ΠΎ јС прСдстављСн Π½ΠΎΠ²ΠΈ Π°Π»Π³ΠΎΡ€ΠΈΡ‚Π°ΠΌ Π·Π° Ρ€Π΅Π΄ΡƒΠΊΡ†ΠΈΡ˜Ρƒ скупова прСсСка ΠΊΠΎΡ…Π΅Ρ€Π΅Π½Ρ‚Π½ΠΎΠ³ БН. ΠžΠ΄Ρ€Π΅Ρ’ΠΈΠ²Π°ΡšΠ΅ свих минипрСсСка ΠΊΠΎΡ…Π΅Ρ€Π΅Π½Ρ‚Π½ΠΎΠ³ БН јС НП Ρ‚Π΅ΠΆΠ°ΠΊ ΠΏΡ€ΠΎΠ±Π»Π΅ΠΌ. Π£ Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜ΠΈ сС Ρ€Π°Π·ΠΌΠ°Ρ‚Ρ€Π°Ρ˜Ρƒ приступи којима сС ΠΏΡ€Π²ΠΎ ΠΎΠ΄Ρ€Π΅Ρ’ΡƒΡ˜Ρƒ сви скупови прСсСка Π΄Π°Ρ‚ΠΎΠ³ БН Π° Π·Π°Ρ‚ΠΈΠΌ сС Π²Ρ€ΡˆΠΈ СлиминисањС надскупова, односно скупова прСсСка који нису ΠΌΠΈΠ½ΠΈΠΌΠ°Π»Π½ΠΈ. Π£ Ρ‚ΠΈΠΌ приступима, БН сС Ρ‚Ρ€Π°Π½ΡΡ„ΠΎΡ€ΠΌΠΈΡˆΠ΅ Ρƒ Π΅ΠΊΠ²ΠΈΠ²Π°Π»Π΅Π½Ρ‚Π½Ρƒ Π±ΡƒΠ»ΠΎΠ²Ρƒ Ρ˜Π΅Π΄Π½Π°Ρ‡ΠΈΠ½Ρƒ Ρƒ којој сС, Π·Π°Ρ‚ΠΈΠΌ, Π΅Π»ΠΈΠΌΠΈΠ½ΠΈΡˆΡƒ сви Ρ€Π΅Π΄ΡƒΠ½Π΄Π°Π½Ρ‚Π½ΠΈ скупови прСсСка. Π’Π΅Ρ› јС Π΄ΠΎΠΊΠ°Π·Π°Π½ΠΎ Π΄Π° су скупови прСсСка, који Π½Π΅ садрТС Π²ΠΈΡˆΠ΅ΡΡ‚Ρ€ΡƒΠΊΠ΅ Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜Π΅, ΠΌΠΈΠ½ΠΈΠΌΠ°Π»Π½ΠΈ. Π’ΠΈΠΌΠ΅ сС Ρ€Π΅Π΄ΡƒΠΊΡ†ΠΈΡ˜Π° ΠΎΠ³Ρ€Π°Π½ΠΈΡ‡Π°Π²Π° само Π½Π° скуповС прСсСка са Π²ΠΈΡˆΠ΅ΡΡ‚Ρ€ΡƒΠΊΠΈΠΌ Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜ΠΈΠΌΠ°. Π£ овој Π΄ΠΈΡΠ΅Ρ€Ρ‚Π°Ρ†ΠΈΡ˜ΠΈ сС посматра још јСдна врста скупова прСсСка: ΠΎΠ½ΠΈ који, Π°ΠΊΠΎ садрТС Π½Π΅ΠΊΠΈ Π²ΠΈΡˆΠ΅ΡΡ‚Ρ€ΡƒΠΊΠΈ Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜, садрТС сва њСгова ΠΏΠΎΠ½Π°Π²Ρ™Π°ΡšΠ°. Овакви скупови прСсСка су ΠΎΠ·Π½Π°Ρ‡Π΅Π½ΠΈ са C*. ΠŸΠΎΠΊΠ°Π·ΡƒΡ˜Π΅ сС Π΄Π° јС скуп прСсСка ΠΎΠ±Π»ΠΈΠΊΠ° C*, Π°ΠΊΠΎ ΠΏΠΎΡΡ‚ΠΎΡ˜ΠΈ, Ρ‚Π°ΠΊΠΎΡ’Π΅ ΠΌΠΈΠ½ΠΈΠΌΠ°Π»Π°Π½. Π’ΠΈΠΌΠ΅ сС Π΄ΠΎΠ΄Π°Ρ‚Π½ΠΎ ΡΠΊΡ€Π°Ρ›ΡƒΡ˜Π΅ поступак Ρ€Π΅Π΄ΡƒΠΊΡ†ΠΈΡ˜Π΅ Π±ΡƒΠ»ΠΎΠ²Π΅ Ρ˜Π΅Π΄Π½Π°Ρ‡ΠΈΠ½Π΅. Π—Π°Ρ‚ΠΈΠΌ сС, Π΄Π°Ρ™Π΅, Π΄ΠΎΠΊΠ°Π·ΡƒΡ˜Ρƒ услови Π·Π° ΠΏΠΎΡΡ‚ΠΎΡ˜Π°ΡšΠ΅ скупова прСсСка ΠΎΠ±Π»ΠΈΠΊΠ° C* ΠΈ ΠΎΠ΄Ρ€Π΅Ρ’ΡƒΡ˜Π΅ ΠΌΠΈΠ½ΠΈΠΌΠ°Π»Π½Π° Π±Ρ€ΠΎΡ˜ скупова прСсСка који сС ΠΌΠΎΠ³Ρƒ Слиминисати ΠΊΠ°ΠΎ надскуп ΠΎΠ΄ C*. ΠŸΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½ јС Π½ΠΎΠ²ΠΈ Π°Π»Π³ΠΎΡ€ΠΈΡ‚Π°ΠΌ Π·Π° Ρ€Π΅Π΄ΡƒΠΊΡ†ΠΈΡ˜Ρƒ Π±ΡƒΠ»ΠΎΠ²Π΅ Ρ˜Π΅Π΄Π½Π°Ρ‡ΠΈΠ½Π΅ Π΄Π°Ρ‚ΠΎΠ³ БН, који сС Π±Π°Π·ΠΈΡ€Π° Π½Π° Ρ€Π°Π·Π΄Π²Π°Ρ˜Π°ΡšΡƒ скупова прСсСка Ρƒ Ρ‚Ρ€ΠΈ Π³Ρ€ΡƒΠΏΠ΅: скупови прСсСка Π±Π΅Π· Π²ΠΈΡˆΠ΅ΡΡ‚Ρ€ΡƒΠΊΠΈΡ… Π΄ΠΎΠ³Π°Ρ’Π°Ρ˜Π°, скупови прСсСка ΠΎΠ±Π»ΠΈΠΊΠ° C* ΠΈ остали скупови прСсСка. Ефикасност Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° јС илустрована Π½Π° Π³Ρ€ΡƒΠΏΠΈ тСст...The Fault Tree Analysis (FTA) is a reliability analysis technique used to determine the root causes and probability of occurrence of a specified top event. FTA is based on a Fault Tree (FT), a graphical model using logic gates and fault events to model the cause-effect relationships involved in causing the top event. Determining minimal cut sets is a qualitative part in the FTA. The cut set is a set of basic events which, when simultaneous, cause the top event to occur. The minimal cut set (minicut) is a cut set which has been reduced to the minimum number of events that cause the top event to occur. This Dissertation proposes a new method for minicuts generation of a coherent FT, constructed using AND and OR logic operator only, with repeated events. The approach is based on the special type of Petri Nets – Reverse Petri Net. First, a new algorithm for reducing cut sets in coherent fault trees is presented. Determining all minicuts of a fault tree is NP-hard problem. Coherent fault trees and the top-down approaches for minicuts generation are considered. The FT can be translated into an equivalent Boolean expression. Obtained Boolean expression then should be reduced by eliminating all redundant cut sets. It is already proved that the cut sets not containing any repeated event are minicuts. This limits the reduction only to the cut sets containing repeated events. Cut sets containing all repetitions of its events are denoted by {C*}. It is proved that C*, if exists, is also minicut. This further limits the reduction of the Boolean expression. In addition, we proved conditions for existence of C* and calculated the minimal number of cut sets that can be eliminated as subsets of C*. Finally, a new algorithm for reduction of the Boolean expression which is based on the partition of the cut sets into three families: those not containing any repeated event, those of type C*, and others, is proposed. The efficiency of the algorithm is shown by applying it to some benchmark fault trees..
    corecore