276 research outputs found

    A History of Until

    Get PDF
    Until is a notoriously difficult temporal operator as it is both existential and universal at the same time: A until B holds at the current time instant w iff either B holds at w or there exists a time instant w' in the future at which B holds and such that A holds in all the time instants between the current one and w'. This "ambivalent" nature poses a significant challenge when attempting to give deduction rules for until. In this paper, in contrast, we make explicit this duality of until to provide well-behaved natural deduction rules for linear-time logics by introducing a new temporal operator that allows us to formalize the "history" of until, i.e., the "internal" universal quantification over the time instants between the current one and w'. This approach provides the basis for formalizing deduction systems for temporal logics endowed with the until operator. For concreteness, we give here a labeled natural deduction system for a linear-time logic endowed with the new operator and show that, via a proper translation, such a system is also sound and complete with respect to the linear temporal logic LTL with until.Comment: 24 pages, full version of paper at Methods for Modalities 2009 (M4M-6

    Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection (Extended Version)

    Get PDF
    We present a formal approach that exploits attacks related to SQL Injection (SQLi) searching for security flaws in a web application. We give a formal representation of web applications and databases, and show that our formalization effectively exploits SQLi attacks. We implemented our approach in a prototype tool called SQLfast and we show its efficiency on real-world case studies, including the discovery of an attack on Joomla! that no other tool can find

    An interpolation-based method for the verification of security protocols

    Get PDF
    Interpolation has been successfully applied in formal methods for model checking and test-case generation for sequential programs. Security protocols, however, exhibit such idiosyncrasies that make them unsuitable to the direct application of interpolation. We address this problem and present an interpolation-based method for security protocol verification. Our method starts from a protocol specification and combines Craig interpolation, symbolic execution and the standard Dolev-Yao intruder model to search for possible attacks on the protocol. Interpolants are generated as a response to search failure in order to prune possible useless traces and speed up the exploration. We illustrate our method by means of concrete examples and discuss the results obtained by using a prototype implementation

    Many accelerating distorted black holes

    Full text link
    An analytical metric of four-dimensional General Relativity, representing an array of collinear and accelerating black holes, is constructed with the inverse scattering method. The solution can be completely regularised from any conical singularity, thanks to the presence of an external gravitational field. Therefore the multi-black hole configuration can be maintained at equilibrium without the need of string or struts. Some notable subcases such as the accelerating distorted Schwarzschild black hole and the double distorted C-metric are explicitly presented. The Smarr law and the thermodynamics of these systems is studied. The Bonnor-Swaminarayan and the Bi\v{c}\'ak-Hoenselaers-Schmidt particle metrics are recovered, through appropriate limits, from the multi-black holes solutions.Comment: 19 pages, 5 figures. v2: minor corrections, references adde

    Charged and rotating multi-black holes in an external gravitational field

    Full text link
    We construct analytical and regular solutions in four-dimensional General Relativity which represent multi-black hole systems immersed in external gravitational field configurations. The external field background is composed by an infinite multipolar expansion, which allows to regularise the conical singularities of an array of collinear static black holes. A stationary rotating generalisation is achieved by adding independent angular momenta and NUT parameters to each source of the binary configuration. Moreover, a charged extension of the binary black hole system at equilibrium is generated. Finally, we show that the binary Majumdar-Papapetrou solution is consistently recovered in the vanishing external field limit. All of these solutions reach an equilibrium state due to the external gravitational field only, avoiding in this way the presence of any string or strut defect.Comment: 22 pages, 4 figures. v2: Mathematica worksheet included in the arXiv files, typos corrected, references adde

    Agent communication and artificial institutions

    Get PDF
    In this paper we propose an application-independent model for the definition of artificial institutions that can be used to define open multi-agent systems. Such a model of institutional reality makes us able also to define an objective and external semantics of a commitment-based Agent Communication Language (ACL). In particular we propose to regard an ACL as a set of conventions to act on a fragment of institutional reality, defined in the context of an artificial institution. Another contribution of the work presented in this paper is an operational definition of norms, a crucial component of artificial institutions. In fact in open systems interacting agents might not conform to the specifications. We regard norms as event-driven rules that when are fired by events happening in the system create or cancel a set of commitments. An interesting aspect of our proposal is that both the definition of the ACL and the definition of norms are based on the same notion of commitment. Therefore an agent capable of reasoning on commitments can reason on the semantics of communicative acts and on the system of norm

    An operational approach to norms in artificial institutions

    Get PDF
    The notion of artificial institution is crucial for the specification of open and dynamic interaction frameworks where heterogeneous and autonomous agents can interact to face problems in various fields, like for instance electronic commerce, business-to-business (B2B) applications, and personal assistant applications. In our view the specification of artificial institutions requires a clear standard definition of some basic concepts: the notion of ontology, authorizations, conventions, and norms. In this paper we propose an operational approach to the definition of norms that is mainly based on the generation of commitments. These norms can be employed to verify if the interacting agents are behaving in accordance with the normative specification of the system. In particular we regard norms as event-driven rules that are fired by events happening in the system and then modify commitments affecting the agents having a certain role. We will discuss the crucial differences between the notion of authorization and permission and how the notion of permissions, obligations, and prohibitions can be expressed in our model. We will investigate the connections among the specification of different artificial institutions, in particular how an institution can enrich or further regulate the entities defined in another one. Finally we will briefly present the specification of the Dutch Auction Institution and of the Auction House Institution in order to exemplify the model presented in this paper

    A Branching Distributed Temporal Logic for Reasoning about Quantum State Transformations

    Get PDF
    The Distributed Temporal Logic DTL allows one to reason about temporal properties of a distributed system from the local point of view of the system's agents, which are assumed to execute independently and to interact by means of event sharing. In this paper, we introduce the Quantum Branching Distributed Temporal Logic QBDTL, a variant of DTL able to represent quantum state transformations in an abstract, qualitative way. In QBDTL, each agent represents a distinct quantum bit (the unit of quantum information theory), which evolves by means of quantum transformations and possibly interacts with other agents, and n-ary quantum operators act as communication/synchronization points between agents. We endow QBDTL with a DTL-style semantics, which fits the intrinsically distributed nature of quantum computing, we formalize a labeled deduction system for QBDTL, and we prove the soundness and completeness of this deduction system with respect to the given semantics. We give a number of examples and, finally, we discuss possible extensions of our logic in order to reason about entangle-ment phenomena

    Artificial institutions: a model of institutional reality for open multiagent systems

    Get PDF
    Software agents' ability to interact within different open systems, designed by different groups, presupposes an agreement on an unambiguous definition of a set of concepts, used to describe the context of the interaction and the communication language the agents can use. Agents' interactions ought to allow for reliable expectations on the possible evolution of the system; however, in open systems interacting agents may not conform to predefined specifications. A possible solution is to define interaction environments including a normative component, with suitable rules to regulate the behaviour of agents. To tackle this problem we propose an application-independent metamodel of artificial institutions that can be used to define open multiagent systems. In our view an artificial institution is made up by an ontology that models the social context of the interaction, a set of authorizations to act on the institutional context, a set of linguistic conventions for the performance of institutional actions and a system of norms that are necessary to constrain the agents' action
    • …
    corecore