569 research outputs found

    Synthesis of Petri Nets with Localities

    Get PDF
    Automated synthesis from behavioural specifications is an attractive way of constructing computational systems. In this paper, we look at a specific instance of this approach which aims at constructing GALS (globally asynchronous locally synchronous) systems. GALS systems are represented by Petri nets with localities, each locality defining a set of co-located actions, and specifications are given in terms of transition systems with arcs labelled by steps of executed actions. The proposed synthesis procedures are based on the regions of transition systems, and work without knowing which actions are to be co-located. We consider two basic classes of Petri nets, viz. Elementary Net System with Localities (ENL-system) and Place/Transition nets with localities (PTL-nets). In particular, we discuss ENL-systems where there is no conflict between events coming from different localities. In such a case, the synthesis problem reduces to checking just one co-location relation. This result is then extended to PTL-nets

    Adding A/Sync Places to the Synthesis Procedure for Whole-Place Operations Nets with Localities

    Get PDF
    Algorithms and the Foundations of Software technolog

    Signal set tissue systems and overlapping localities

    Get PDF
    Algorithms and the Foundations of Software technolog

    A Flow Sensitive Security Model for Cloud Computing Systems

    Get PDF
    A flow sensitive security model is presented to analyse information flow in federated cloud systems. Each cloud and the entities of the cloud system are classified into different security levels which form a security lattice. Opacity --- a general technique for unifying security properties --- turns out to be a promising analytical technique in the context of cloud computing systems. The proposed approach can help to track and control the secure information flow in federated cloud systems. It can also be used to analyze the impact of different resources allocation strategies

    Opacity in Internet of Things with Cloud Computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Internet of Things (IoT) with Cloud Computing (CC) is a new paradigm incorporating a pervasive presence of a wide range of things/objects which can interact with each other and cooperate, creating new services and reaching common goals. This will lead to more intelligent smart environments in a wide range of applications. In this context, protecting the Internet of Things with Cloud Computing (IoTwCC) against interference, including service attacks and viruses, becomes paramount. In this paper, we introduce a transition system representation to capture the information flow in IoTwCCs, and then investigate the opacity of the information flow model. In addition, we introduce a threat model to describe the actions of the system, and propose entropy as a security metrics to quantify the amount of information related to a service that might be exposed to other users or adversaries. It turns out that the opacity of the system is affected by the availability of the services. As a result, the trade-off between opacity and service availability can be analyzed

    Classifying Invariant Structures of Step Traces

    Get PDF
    In the study of behaviours of concurrent systems, traces are sets of behaviourally equivalent action sequences. Traces can be represented by causal partial orders. Step traces, on the other hand, are sets of behaviourally equivalent step sequences, each step being a set of simultaneous actions. Step traces can be represented by relational structures comprising non-simultaneity and weak causality. In this paper, we propose a classification of step alphabets as well as the corresponding step traces and relational structures representing them. We also explain how the original trace model fits into the overall framework.Algorithms and the Foundations of Software technolog

    Petri Nets for Biologically Motivated Computing

    Get PDF
    Petri nets are a general and well-established model of concurrent and distributed computation and behaviour, including that taking place in biological systems. In this survey paper, we are concerned with intrinsic relationships between Petri nets and two formal models inspired by aspects of the functioning of the living cell: membrane systems and reaction systems. In particular, we are interested in the benefits that can result from establishing strong semantical links between Petri nets and membrane systems and reaction systems. We first discuss Petri nets with localities reflecting the compartmentalisation modelled in membrane systems. Then special attention is given to set-nets, a new Petri net model for reaction systems and their qualitative approach to the investigation of the processes carried out by biochemical reactions taking place in the living cell

    Intensity-based axial localization at the quantum limit

    Get PDF
    We derive fundamental precision bounds for single-point axial localization. For Gaussian beams, this ultimate limit can be achieved with a single intensity scan, provided the camera is placed at one of two optimal transverse detection planes. Hence, for axial localization there is no need of more complicated detection schemes. The theory is verified with an experimental demonstration of axial resolution 3 orders of magnitude below the classical depth of focus

    Performance Modelling and Evaluation of Enterprise Information Security Technologies

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.By providing effective access control mechanisms, enterprise information security technologies have been proven successful in protecting the confidentiality of sensitive information in business organizations. However, such security mechanisms typically reduce the work productivity of the staff, by making them spend time working on non-project related tasks. Therefore, organizations have to invest a signification amount of capital in the information security technologies, and then to continue incurring additional costs. In this study, we investigate the performance of administrators in an information help desk, and the non-productive time (NPT) in an organization, resulting from the implementation of information security technologies. An approximate analytical solution is discussed first, and the loss of staff member productivity is quantified using non-productive time. Stochastic Petri nets are then used to provide simulation results. The presented study can help information security managers to make investment decisions, and to take actions toward reducing the cost of information security technologies, so that a balance is kept between information security expense, resource drain and effectiveness of security technologies
    • …
    corecore