363,983 research outputs found

    Decidable Inductive Invariants for Verification of Cryptographic Protocols with Unbounded Sessions

    Get PDF
    We develop a theory of decidable inductive invariants for an infinite-state variant of the Applied ?calc, with applications to automatic verification of stateful cryptographic protocols with unbounded sessions/nonces. Since the problem is undecidable in general, we introduce depth-bounded protocols, a strict generalisation of a class from the literature, for which our decidable analysis is sound and complete. Our core contribution is a procedure to check that an invariant is inductive, which implies that every reachable configuration satisfies it. Our invariants can capture security properties like secrecy, can be inferred automatically, and represent an independently checkable certificate of correctness. We provide a prototype implementation and we report on its performance on some textbook examples

    Guest editorial

    Get PDF
    This special issue of Decision Making in Manufacturing and Services is devoted to Game Theory and Applications and related topics. The origin of the issue is the 10th Spain-Italy-Netherlands Meeting on Game Theory (SING10), which took place on 7th-9th July, 2014. The conference was hosted by the Faculty of Management at AGH University of Science and Technology in Kraków, Poland (main organizer was Izabella Stach). The history of the SING meetings started at the beginning of the 1980s with the first meetings held in Italy. Then, subsequently, meetings were added in Spain, the Netherlands and Poland. Nowadays SING is one of the most important international meetings on game theory organized each year in a European country.The SING10 meeting in 2014 attracted more than one hundred and ninety scientist from five continents. More about the SING meetings and in particular about SING10 can be funded in Gambarelli (2011) and Bertini et al. (2014). The submitted papers (139 presentations, 135 in parallel sessions and 4 in plenary sessions) covered a variety of topics on game theory and its applications. This special issue collects some surveys on recent results in different fields, presented in the conference

    Systematic composition of distributed objects: Processes and sessions

    Get PDF
    We consider a system with the infrastructure for the creation and interconnection of large numbers of distributed persistent objects. This system is exemplified by the Internet: potentially, every appliance and document on the Internet has both persistent state and the ability to interact with large numbers of other appliances and documents on the Internet. This paper elucidates the characteristics of such a system, and proposes the compositional requirements of its corresponding infrastructure. We explore the problems of specifying, composing, reasoning about and implementing applications in such a system. A specific concern of our research is developing the infrastructure to support structuring distributed applications by using sequential, choice and parallel composition, in the anarchic environment where application compositions may be unforeseeable and interactions may be unknown prior to actually occurring. The structuring concepts discussed are relevant to a wide range of distributed applications; our implementation is illustrated with collaborative Java processes interacting over the Internet, but the methodology provided can be applied independent of specific platforms

    Combining behavioural types with security analysis

    Get PDF
    Today's software systems are highly distributed and interconnected, and they increasingly rely on communication to achieve their goals; due to their societal importance, security and trustworthiness are crucial aspects for the correctness of these systems. Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforcement of correctness properties in communicating systems. This paper offers a unified overview of proposals based on behavioural types which are aimed at the analysis of security properties

    The role of an omnipresent pocket device : smartphone attendance and the role of user habits

    Get PDF
    Smartphones are convergent, always-on pocket devices that have taken up an important role in the life of their users. This warrants a closer look into how this medium is used in every-day situations. Are goal-oriented incentives the main drive for smartphone usage, or do habits play a critical role? This study with 481 Belgian smartphone users attempts to describe the precedents of smartphone attendance by validating the model of media attendance (MMA), a social-cognitive theory of uses and gratifications (LaRose & Eastin, 2004). We surprisingly did not find evidence for a significant effect of habits on smartphone usage. We suggest two explanations. First, we suggest some uncertainties concerning the MMA methodology. Second, we suggest a more complex reality in which several habitual use patterns are shaped, dependent on user, context and device. This warrants a more in-depth study, using more advanced measures for smartphone usage and habit strength

    A Modular Toolkit for Distributed Interactions

    Full text link
    We discuss the design, architecture, and implementation of a toolkit which supports some theories for distributed interactions. The main design principles of our architecture are flexibility and modularity. Our main goal is to provide an easily extensible workbench to encompass current algorithms and incorporate future developments of the theories. With the help of some examples, we illustrate the main features of our toolkit.Comment: In Proceedings PLACES 2010, arXiv:1110.385
    corecore