Abstracts of talks at the Swansea IFIP WG1.3 meeting

    Abstracts of talk at the Swansea IFIP WG1.3 meeting (September 6-8, 2005)


    ------------------------------------------------------
  • Marie-Claude Gaudel: Undoing in Composite Web Services (slides)
    Marie-Claude Gaudel, LRI, Paris-Sud University & CNRS, Orsay, France
    mcg at lri.fr

    Cancelling or reversing the effect of a former action is a necessity in most interactive systems. The simplest and most frequent form of this facility is the "undo" command that is available in usual, individual, text or graphic editors. As soon as collaborative work is considered, undoing is more intricate since the notion of a last action is not always meaningful. Within this framework, the so-called "selective undo", which allows selecting and cancelling any (or rather some?) former action, has received lot of attention. There are some similarities between cooperative work and composite web services: Component web services are concurrently accessed; they may be treated as shared documents for undoing former actions. Among the latest results on undoing in group editors, the transformational model seems suitable for generalization to other kinds of distributed systems. It completely avoids backward state recovery and allows the selection and cancellation of any former operation. We present some relevant aspects of this model, and then some hints on how to transpose it into the framework of composite web services.

    Full paper: Marie-Claude Gaudel, Undoing in Composite Web Services, ICSE/DSN 2004 Twin Workshops on Architecturing Dependable Systems (WADS 2004), Firenze, June 2004, proceedings in: Architecting Dependable Systems III, LNCS 3549, pp. 59-68, 2005

  • ------------------------------------------------------
  • Rolf Hennicker: Externalized and Internalized Notions of Behavioral Refinement
    (joint work with M. Bidoit)

    Many different behavioral refinement notions for algebraic specifications have been proposed in the literature but the relationship between the various concepts is still unclear. In this paper we provide a classification and a comparative study of behavioral refinements according to two directions, the externalized approach which uses an explicit behavioral abstraction operator that is applied to the specification to be implemented, and the internalized approach which uses a built-in behavioral semantics of specifications. We show that both concepts are equivalent under suitable conditions. The formal basis of our study is provided by the COL institution (constructor-based observational logic). Hence, as a side-effect of our study on internalized behavioral refinements, we introduce also a novel concept of behavioral refinement for COL-specifications.

    This talk is based on the paper Externalized and Internalized Notions of Behavioral Refinement by M. Bidoit and R. Hennicker.
    Proc. ICTAC 2005, 2nd Int. Colloq. on Theoretical Aspects of Computing, 2005, Hanoi, Springer Lecture Notes in Computer Science 3722, 334-350.

  • ------------------------------------------------------
  • Bart Jacobs: RIES - Internet Voting in Action (paper)

    RIES stands for Rijnland Internet Election System. It is an online voting system that was developed by one of the Dutch local authorities on water management. The system has been used twice in the fall of 2004 for in total approximately two million potential voters. We describe how this system works. Furthermore we do not only describe how the outcome of the elections can be verified but also how it has been verified by us. To conclude we describe some possible points for improvement.

  • ------------------------------------------------------
  • Alexander Kurz: Operations and Equation for Coalgebras
    (joint work with J. Rosicky, appeared in Mathematical Structures in Computer Science 15:149-166, 2005)

    1.) Usually, coalgebras are given wrt a functor. We show that coalgebras can also be given by operations and equations. This relies on work of Linton from 1969 who showed how to specify algebras over an abribrary base category and, for example, proved that a category is monadic (over some base category) if and only if it has a presentation by operations and equations and has free algebras (thus generalising a theorem well-known for algebras over Set). Since coalgebras over Set are (dual to) algebras over Set^op, Lintons approach gives a notion of operations and equations for coalgebras. We give some examples.

    2.) Given an arbitrary functor U:A-->Set, we say that two elements a,a' of two objects in A are *bisimilar* if they can be connected by morphisms in A. We show that coalgebraic operations correspond to predicate transformers that respect bisimulation and that coalgebraic equations correspond to modal predicates.

    3.) Given a functor U:A-->Set, an (n,m)-ary *implicit* (coalgebraic) operation is a natural transformation Set(U-,n)-->Set(U-,m). We show that classes of coalgebras closed under subcoalgebras, homomorphic images and coproducts are precisely the classes definable by equations in implicit operations. This theorem does not require the existence of cofree coalgebras and therefore generalises previously known Birkhoff-style theorems for coalgebras. It is the analogue for coalgebras of Reiterman's famous theorem in universal algebra.

  • ------------------------------------------------------
  • Narciso Marti-Oliet: Towards a strategy language for Maude
    (joint work with Jose Meseguer and Alberto Verdejo)

    We describe a proposal for a strategy language for Maude, to control the rewriting process and to be used at the object level instead of at the metalevel. We also describe a prototype implementation built over Full Maude using the metalevel and the metalanguage facilities provided by Maude. We include a series of examples that illustrate the main features of the proposed strategy language. This language has been put to work in the implementation of operational semantics for the ambient calculus and for the parallel functional language Eden.

    Related papers:
    N. Marti-Oliet, J. Meseguer, and A. Verdejo
    Towards a strategy language for Maude
    In N. Marti-Oliet (ed.), Fifth International Workshop on Rewriting Logic and its Applications, WRLA 2004, Barcelona, Spain, Part of ETAPS 2004, ENTCS 117, Elsevier Science, 417-441, 2005.

    F. Rosa-Velardo, C. Segura, and A. Verdejo.
    Typed Mobile Ambients in Maude.
    In H. Cirstea and N. Marti-Oliet (eds.), 6th International Workshop on Rule-Based Programming, RULE 2005, Nara, Japan, ENTCS, Elsevier Science, to appear.

    M. Hidalgo-Herrero, A. Verdejo, and Y. Ortega-Mallen.
    Looking for Eden through Maude and its strategies.
    In F. Lopez-Fraguas (ed.), Fifth Spanish Conference on Programming and Computer Languages, PROLE 2005, Granada, Spain, Part of CEDI 2005.

  • ------------------------------------------------------
  • Dominique Méry: Refinement and security - Ongoing works (slides)

    Software-based systems can be built in step-by-step approach based on the refinement relation over models and they are correct by construction. The models are supposed to satisfy safety properties and other properties related to security can be useful to integrate in the refinement-based development. We present the first results integrating ORBAC models into B models and we show how to link both approaches.

  • ------------------------------------------------------
  • Ugo Montanari: Reactive Systems for Context Borrowing, Symbolic Execution and Web Service Binding

    by Ugo Montanari, Dipartimento di Informatica, Università di Pisa

    Joint work with Roberto Bruni, Gianluigi Ferrari, Fabio Gadducci, Pawel Sobocinski and Emilio Tuosto

    A systematic method for deriving bisimulation congruence from reduction rules has been proposed by Leifer and Milner, on turn inspired by Sewell. Also,the approach of observing contexts imposed on agents at each step has been proposed earlier by Montanari and Sassone, yielding the notion of dynamic bisimilarity. The basic idea of Leifer and Milner is to express "minimality"conditions for electing the context c among the (possibly infinite) ones that allow p to react. These conditions have been distilled by them in the notion of relative push-out (RPO) in a categories of reactive systems and made more general by Sassone, Sobocinski and Lack. The RPO construction is reminiscent of the unification process of logic programming, which in fact can be given an interactive semantics in much the same style. In the talk we present a short survey of the work by Leifer and Milner and Sassone, Sobocinski and Lack, and describe some recent developments which allow to see this approach under a larger viewpoint. The first contribution [1] observes contexts also for symbolic execution, suggesting applications to web service binding; the second [2] tackles the weak case by taking advantage of the tile model; and the third [3] uses cospan categories on adhesive categories, as suggested by Sassone, Sobocinski and Lack, for representing process calculi as graph transformation systems.

    [1] Ferrari, G., Montanari, U. and Tuosto, E., Model Checking for Nominal Calculi, invited talk, in: Vladimiro Sassone, Ed., FOSSACS 2005, Springer LNCS 3441, 2005, pp. 1-24.

    [2] Bruni, R., Gadducci, F., Montanari, U. and Sobocinski, P., Deriving Weak Bisimulation Congruences from Reduction Systems, in: Martin Abadi and Luca De Alfaro, Eds., CONCUR 2005, Springer LNCS, to appear.

    [3] Gadducci, F. and Montanari, U., Observing Reductions in Nominal Calculi via a Graphical Encoding of Processes, in: Festschrift in Honor of Jan Willem Klop, Springer LNCS, to appear.

  • ------------------------------------------------------
  • Till Mossakowski: Heterogeneous Framework Integration Initiative (slides)

    The Heterogeneous Framework Integration Initiative has been initiated during January 2005 meeting of the IFIP WG 1.3. It aims at foundations and tools supporting the use of several modelling techniques during the development of systems, including logics, semi-formal notations such as the UML, and parallel program design languages and calculi, inter alia. This effort responds to the challenge that software and hardware companies are facing to use multiple viewpoints when specifying complex software intensive systems: various viewpoint specifications are often needed to capture various specific aspect of the system, with global properties of system behaviour emerging from their composition. Moreover, heterogenetiy may also arise in the course of software development: changes in the formalisms involved may be needed, as appropriate for the given stage.

    In spite of a number of proposals for ad-hoc combinations of different formalisms, we are not yet at a stage where modelling techniques can be integrated in a systematic way. Moreover, we need to provide levels of semantic-based integration that can extend to tools and provide environments in which the design of software and hardware systems is an activity that meets engineering standards of quality and trust. Finally, we need such environments to be endowed with an architecture that facilitates run-time integration and interoperability in order to avoid the risk of combinatorial explosion incurred when integration is performed at "compile-time".

    HiFi is an open, collaborative initiative that will work on

    - foundations of a meta-framework: what is a formalism? Institutions can be a starting point, but how to integrate process calculi, program design and architectural description languages, transition systems, programming languages?
    - integration of many existing formalisms
    - a service-oriented architecture for tool integration in a logical context, based on free software
    - case studies demonstrating the usefulness of the approach

  • ------------------------------------------------------
  • Peter Padawitz: Dialgebraic specification and modeling (slides)

    Dialgebraic specifications combine algebraic with coalgebraic ones. We present a uniform syntax, semantics and proof system for chains of signatures and axioms such that presentations of visible data types may alternate with those of hidden state types. Each element in the chain matches a design pattern that reflects some least/initial or greatest/final model construction over the respective predecessor in the chain. We sort out twelve such design patterns. Six of them lead to least models, the other six to greatest models. Each construction of the first group has its dual in the second group. All categories used in this approach are classes of structures with many-sorted carrier sets. The model constructions could be generalized to other categories, but this is not a goal of our approach. On the contrary, we aim at applications in software (and, maybe, also hardware) design and will show that for describing and solving problems in this area one need not go beyond categories of sets. Consequently, a fairly simple, though sufficiently powerful, syntax of dialgebraic specifications that builds upon classical algebraic notations as much as possible is crucial here. It captures the main constructions of both universal (co)algebra and relational fixpoint semantics, and thereby extends "Lawvere-style" algebraic theories from product to arbitrary polynomial types and modal logics from one- to many-sorted Kripke frames.

    This work is still in progress. This draft paper contains its current state.

  • ------------------------------------------------------
  • Dirk Pattinson: Domain Theoretic Analysis of Separated Hybrid Automata (slides)

    We define a domain theoretic semantics of non-linear hybrid automata, and shows that this denotational semantics is effectively computable. For a hybrid automaton H, the semantics assigns to every point t in time the set $[| H |](t) of states that H can enter into at time t, starting from one if its initial states. The semantic function is defined as a least fixpoint in the domain of compact-set valued functions of one real variable. This allows to use standard domain theoretic techniques to obtain effective algorithms to compute the semantic function, resulting in a directly implementable framework for the reachability analysis of a large class of non-linear hybrid automata. As a by-product, we obtain several new computability and continuity results for hybrid automata.

  • ------------------------------------------------------
  • Dusko Pavlovic: On testing and specifying (slides)
    talk by Dusko Pavlovic (joint work in progress with Bart Jacobs)

    In the various areas of computer science, the notions of testing are formulated in different ways, and studied with different goals: e.g., in concurrency theory, tests are used to establish equivalence of processes, whereas in software engineering, they are used to show that the implementations do not satisfy specifications. We present some preliminary results of work towards a general testing framework, allowing both qualitative and quantitative comparison of processes, on different levels of abstraction. Of particular interest are applications in representing distributed probabilistic processes, such as cryptosystems, and quantifying the information flows between them.

  • ------------------------------------------------------
  • S. Ramesh: Modelling and verification with synchronous protocol automata
    S. Ramesh, GM R&D Bangalore and IIT Bombay

    Plug-n-Play style Intellectual Property(IP) reuse in System on Chip(SoC) design is facilitated by the use of an on-chip bus architecture. Component integration and verification in such systems is a cumbersome and time consuming process largely concerned with interfacing related issues. We present a synchronous, Finite State Machine based framework for modelling communication aspects of such architectures. This formalism has been developed via interaction with designers and the industry and is intuitive and light weight. We have developed cycle accurate methods which can be used for protocol specification, compatibility verification, interface synthesis and model checking with automated specification. The case studies we performed include the AMBA family of protocols and a proprietary industrial bus protocol. Our experience has shown that our models enable reasoning about and comparison of di erent bus architectures to gain valuable design insights. We demonstrate the utility of our framework by modelling the AMBA bus architecture including details such as pipelined operation, burst transfers, the AHBAPB bridge and arbitration features.

  • ------------------------------------------------------
  • Jan Rutten: Algebraic specification and coalgebraic synthesis of Mealy automata
    J.J.M.M. Rutten, CWI and VUA, Amsterdam

    We introduce the notion of functional stream derivative, generalising the notion of input derivative of rational expressions (Brzozowski 1964) to the case of stream functions over arbitrary input and output alphabets. We show how to construct Mealy automata from algebraically specified stream functions by the symbolic computation of functional stream derivatives. We illustrate this construction in full detail for various bitstream functions specified in the algebraic calculus of the 2-adic numbers. This work is part of a larger ongoing effort to specify and model component connector circuits in terms of (functions and relations on) streams.

    Reference: This paper will appear in the Proceedings of FACS'05. A preliminary version is available.

  • ------------------------------------------------------
  • Mark D. Ryan: Evaluating access control policies through model checking

    This is the paper corresponding to my talk.
    Nan Zhang, Mark D. Ryan and Dimitar Guelev, Evaluating Access Control Policies Through Model Checking. Eighth Information Security Conference (ISC\x{2019}05). Lecture Notes in Computer Science, Springer-Verlag, 2005.

    Abstract. We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the policies give legitimate users enough permissions to reach their goals, but also checking whether the policies prevent intruders from reaching their malicious goals. Policies of the access control system and goals of agents must be described in the access control description and specification language introduced as RW in our earlier work. The algorithm takes a policy description and a goal as input and performs two modes of checking. In the assessing mode, the algorithm searches for strategies consisting of reading and writing steps which allow the agents to achieve their goals no matter what states the system may be driven into during the execution of the strategies. In the intrusion detection mode, a weaker notion of strategy is used, reflecting the willingness of intruders to guess the value of attributes which they cannot read.

  • ------------------------------------------------------
  • Lutz Schröder: Finite models for coalgebraic logic (slides)

    In recent years, a tight connection has emerged between modal logic on the one hand and coalgebras, understood as generic transition systems, on the other hand. Here, we prove that finitary coalgebraic modal logic has the finite model property. This fact not only reproves known completeness results for coalgebraic modal logic, which we push further by establishing that every coalgebraic modal logic admits a complete rank-$1$-axiomatization; it also enables us to establish a generic decidability result and a first complexity bound. Examples covered by these general results include, besides standard Hennessy-Milner logic, graded modal logic and probabilistic modal logic.

  • ------------------------------------------------------
  • John Tucker: Specification and Computation with Continuous Data

    J V Tucker (Swansea)

    This talk reports on my work with J I Zucker (McMaster).

    We consider computability theory for infinite data, such as real numbers, signals and wave forms, streams, spatial objects, and functions. Usually, such data is collected into topological spaces and so we consider models of computation for functions and sets on topological spaces.

    The many models fall into two types. First, there are concrete models of computation which depend on building a representation of the space of data, usually from the natural numbers, and defining computability on the space in terms of computability on the representation. This is the standard approach of Computable Analysis starting in the 1950s; it is used in current work based on Pour El and Richards' computation structures, Klaus Weihrauch's TTE, Stoltenberg-Hansen, Tucker and Edalat's domain representations, and Spreen's effective topology.

    Secondly, there are abstract models that define computability independently of all representations. The spaces are given algebraic structure (e.g., that of a Banach space) and programs and machines are based on the structure. Thus, computation is abstract in precisely the way algebra is abstract: computation is invariant under isomorphism. This is the approach of many generalisations of recursion theory starting in the 1950s; it is used in some current work by S Smale and his collaborators (on rings and fields) and J I Zucker and J V Tucker (on many sorted algebras).

    The lecture discussed some current results and problems, especially on the equivalence of the concrete and abstract models. Recent results of Tucker and Zucker show that equivalence is possible for very general topological data types but requires a study of programmable approximations of partial multivalued functions on metric algebras.

    We also discussed applications to the theory of algebraic specification of exact computation on real numbers and metric data types in general. We showed that there exist finite algebraic specifications, called universal specifications, that can define all the computably approximable functions on a metric algebra. Thus, there exist finite sets of algebraic formulae that can define uniquely all the computable systems and processes that can be faithfully simulated on a computer.