首页 > 最新文献

Logic Journal of the IGPL最新文献

英文 中文
Adaptive graph Laplacian MTL L1, L2 and LS-SVMs 自适应图拉普拉斯 MTL L1、L2 和 LS-SVM
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-24 DOI: 10.1093/jigpal/jzae025
Carlos Ruiz, Carlos M Alaíz, José R Dorronsoro
Multi-Task Learning tries to improve the learning process of different tasks by solving them simultaneously. A popular Multi-Task Learning formulation for SVM is to combine common and task-specific parts. Other approaches rely on using a Graph Laplacian regularizer. Here we propose a combination of these two approaches that can be applied to L1, L2 and LS-SVMs. We also propose an algorithm to iteratively learn the graph adjacency matrix used in the Laplacian regularization. We test our proposal with synthetic and real problems, both in regression and classification settings. When the task structure is present, we show that our model is able to detect it, which leads to better results, and we also show it to be competitive even when this structure is not present.
多任务学习(Multi-Task Learning)试图通过同时解决不同任务来改进学习过程。一种流行的 SVM 多任务学习方法是将普通任务和特定任务结合起来。其他方法则依赖于使用图形拉普拉斯正则。在此,我们提出了这两种方法的组合,可应用于 L1、L2 和 LS-SVM。我们还提出了一种算法,用于迭代学习拉普拉斯正则化中使用的图邻接矩阵。我们在回归和分类设置中使用合成问题和实际问题对我们的建议进行了测试。结果表明,当任务结构存在时,我们的模型能够检测到它,从而获得更好的结果。
{"title":"Adaptive graph Laplacian MTL L1, L2 and LS-SVMs","authors":"Carlos Ruiz, Carlos M Alaíz, José R Dorronsoro","doi":"10.1093/jigpal/jzae025","DOIUrl":"https://doi.org/10.1093/jigpal/jzae025","url":null,"abstract":"Multi-Task Learning tries to improve the learning process of different tasks by solving them simultaneously. A popular Multi-Task Learning formulation for SVM is to combine common and task-specific parts. Other approaches rely on using a Graph Laplacian regularizer. Here we propose a combination of these two approaches that can be applied to L1, L2 and LS-SVMs. We also propose an algorithm to iteratively learn the graph adjacency matrix used in the Laplacian regularization. We test our proposal with synthetic and real problems, both in regression and classification settings. When the task structure is present, we show that our model is able to detect it, which leads to better results, and we also show it to be competitive even when this structure is not present.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"22 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140314616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices 使用 MQTT 协议对物联网设备网络中的入侵检测进行贝塔海比学习
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-22 DOI: 10.1093/jigpal/jzae013
Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón, José Luis Calvo-Rolle
This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set of projections that enable human experts to visually identify most attacks in real-time, making it a powerful tool that can be implemented in IoT environments easily.
本文旨在通过一种可视化工具,利用 Beta Hebbian Learning(BHL)、t-distributed Stochastic Neighbor Embedding(t-SNE)和 ISOMAP 等三种投影技术,提高物联网设备网络的安全性,以方便人类专家识别网络攻击。这项研究工作首先创建了一个带有物联网设备和网络客户端的测试环境,通过消息队列遥测传输(MQTT)模拟攻击,记录所有相关流量信息。所选的无监督算法提供了一组预测,使人类专家能够实时直观地识别大多数攻击,从而使其成为一种可在物联网环境中轻松实施的强大工具。
{"title":"Beta Hebbian Learning for intrusion detection in networks with MQTT Protocols for IoT devices","authors":"Álvaro Michelena, María Teresa García Ordás, José Aveleira-Mata, David Yeregui Marcos del Blanco, Míriam Timiraos Díaz, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Héctor Alaiz-Moretón, José Luis Calvo-Rolle","doi":"10.1093/jigpal/jzae013","DOIUrl":"https://doi.org/10.1093/jigpal/jzae013","url":null,"abstract":"This paper aims to enhance security in IoT device networks through a visual tool that utilizes three projection techniques, including Beta Hebbian Learning (BHL), t-distributed Stochastic Neighbor Embedding (t-SNE) and ISOMAP, in order to facilitate the identification of network attacks by human experts. This work research begins with the creation of a testing environment with IoT devices and web clients, simulating attacks over Message Queuing Telemetry Transport (MQTT) for recording all relevant traffic information. The unsupervised algorithms chosen provide a set of projections that enable human experts to visually identify most attacks in real-time, making it a powerful tool that can be implemented in IoT environments easily.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"45 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140204109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realtime polymorphic malicious behavior detection in blockchain-based smart contracts 在基于区块链的智能合约中实时检测多态恶意行为
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-20 DOI: 10.1093/jigpal/jzae016
Darius Galiş, Ciprian Pungilă, Viorel Negru
This paper proposes an innovative approach to achieving real-time polymorphic behavior detection, and its direct application to blockchain-focused smart-contracts. We devise a method based on a non-deterministic finite state machine to perform approximate pattern-matching, using a look-ahead mechanism implemented through a concept similar to that of a sliding window, and using threshold-based similarity checking at every state in the automaton. We introduce and formalize our approach, discuss the challenges we faced and then test it in a real-world environment. The experimental results obtained showed a significant speed-up of our approach, as compared to the classic similarity measures used commonly in such scenarios.
本文提出了一种实现实时多态行为检测的创新方法,并将其直接应用于以区块链为重点的智能合约。我们设计了一种基于非确定性有限状态机的方法来执行近似模式匹配,该方法使用一种通过类似于滑动窗口的概念实现的前瞻机制,并在自动机的每个状态使用基于阈值的相似性检查。我们介绍了我们的方法并将其形式化,讨论了我们面临的挑战,然后在实际环境中对其进行了测试。实验结果表明,与此类场景中常用的经典相似性测量方法相比,我们的方法大大加快了速度。
{"title":"Realtime polymorphic malicious behavior detection in blockchain-based smart contracts","authors":"Darius Galiş, Ciprian Pungilă, Viorel Negru","doi":"10.1093/jigpal/jzae016","DOIUrl":"https://doi.org/10.1093/jigpal/jzae016","url":null,"abstract":"This paper proposes an innovative approach to achieving real-time polymorphic behavior detection, and its direct application to blockchain-focused smart-contracts. We devise a method based on a non-deterministic finite state machine to perform approximate pattern-matching, using a look-ahead mechanism implemented through a concept similar to that of a sliding window, and using threshold-based similarity checking at every state in the automaton. We introduce and formalize our approach, discuss the challenges we faced and then test it in a real-world environment. The experimental results obtained showed a significant speed-up of our approach, as compared to the classic similarity measures used commonly in such scenarios.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"8 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140204107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some results for min matrices associated with Chebyshev polynomials 与切比雪夫多项式相关的最小矩阵的一些结果
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-20 DOI: 10.1093/jigpal/jzae028
Fatih Yilmaz, Samet Arpaci, Aybüke Ertaş
In the present study, inspired by the studies in the literature, we consider Min matrix and its Hadamard exponential matrix family whose elements are Chebyshev polynomials of the first kind. Afterwards, we examine their various linear algebraic properties and obtain some inequalities. Furthermore, we shed light on the results we obtained to boost the clarity of our paper with the illustrative examples. In addition to all these, we give two MATLAB-R2023a codes that compute the Min matrix and the Hadamard exponential matrix with Chebyshev polynomials of the first kind entries, as well as calculate some matrix norms.
在本研究中,受文献研究的启发,我们考虑了 Min 矩阵及其哈达玛指数矩阵族,它们的元素是切比雪夫多项式的第一种。随后,我们研究了它们的各种线性代数性质,并得到了一些不等式。此外,我们还通过举例说明来阐明我们所获得的结果,以提高论文的清晰度。除此之外,我们还给出了两个 MATLAB-R2023a 代码,用于计算带有切比雪夫多项式第一类项的 Min 矩阵和 Hadamard 指数矩阵,以及计算一些矩阵规范。
{"title":"Some results for min matrices associated with Chebyshev polynomials","authors":"Fatih Yilmaz, Samet Arpaci, Aybüke Ertaş","doi":"10.1093/jigpal/jzae028","DOIUrl":"https://doi.org/10.1093/jigpal/jzae028","url":null,"abstract":"In the present study, inspired by the studies in the literature, we consider Min matrix and its Hadamard exponential matrix family whose elements are Chebyshev polynomials of the first kind. Afterwards, we examine their various linear algebraic properties and obtain some inequalities. Furthermore, we shed light on the results we obtained to boost the clarity of our paper with the illustrative examples. In addition to all these, we give two MATLAB-R2023a codes that compute the Min matrix and the Hadamard exponential matrix with Chebyshev polynomials of the first kind entries, as well as calculate some matrix norms.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"67 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140204291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection, exploitation and mitigation of memory errors 内存错误的检测、利用和缓解
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-16 DOI: 10.1093/jigpal/jzae008
Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez, Pablo Garcia Bringas
Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense methods. In this paper, we summarise the main memory safety violation types (i.e. memory errors), and analyse how they are exploited by attackers and the main mitigation methods proposed in the research community. We further systematise the most relevant techniques with regards to memory corruption identification in current programs.
软件漏洞是计算机系统中众多安全问题的根源。由于 C 和 C++ 编程语言的高效性和对底层系统资源的严格控制,它们被广泛应用于从操作系统内核到用户空间应用程序等众多领域。然而,内存管理不足或不当经常导致无效内存访问,最终造成内存损坏漏洞。这些漏洞被用作精心设计的攻击的立足点,从而绕过现有的防御方法。在本文中,我们总结了主要的内存安全违规类型(即内存错误),分析了攻击者如何利用这些漏洞以及研究界提出的主要缓解方法。我们将进一步系统化当前程序中与内存损坏识别相关的最重要技术。
{"title":"Detection, exploitation and mitigation of memory errors","authors":"Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez, Pablo Garcia Bringas","doi":"10.1093/jigpal/jzae008","DOIUrl":"https://doi.org/10.1093/jigpal/jzae008","url":null,"abstract":"Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense methods. In this paper, we summarise the main memory safety violation types (i.e. memory errors), and analyse how they are exploited by attackers and the main mitigation methods proposed in the research community. We further systematise the most relevant techniques with regards to memory corruption identification in current programs.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"19 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards enhanced monitoring framework with smart predictions 通过智能预测改进监测框架
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-16 DOI: 10.1093/jigpal/jzae010
Antonello Calabrò, Said Daoudagh, Eda Marchetti
Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions is by using a smart monitoring framework to continuously verify functional and non-functional property violations during the executions of the systems and their components. Method: This paper presents a set of guidelines for the Smart Monitoring Framework definition and its application process. Results and Conclusion: The paper provides the reference architecture of the Smart Monitoring Framework and its possible implementation to promptly detect suspicious behavior or property violations. The paper also illustrates how the provided implementation satisfies the defined guidelines by design.
背景:预测安全和信任漏洞及问题对于物联网互联系统和生态系统至关重要,尤其是在集成新的第三方或开源组件时。目标:确保及时预测的一种方法是使用智能监控框架,在系统及其组件执行过程中持续验证功能和非功能属性违规情况。方法:本文介绍了一套智能监控框架定义及其应用流程指南。结果与结论:本文提供了智能监控框架的参考架构及其可能的实施方案,以便及时发现可疑行为或属性违规行为。本文还说明了所提供的实施方案如何在设计上满足所定义的准则。
{"title":"Towards enhanced monitoring framework with smart predictions","authors":"Antonello Calabrò, Said Daoudagh, Eda Marchetti","doi":"10.1093/jigpal/jzae010","DOIUrl":"https://doi.org/10.1093/jigpal/jzae010","url":null,"abstract":"Context: Predicting security and trust vulnerabilities and issues is crucial for IoT interconnected systems and ecosystems, especially when integrating new, third-party or open-source components. Objective: One way to ensure timely predictions is by using a smart monitoring framework to continuously verify functional and non-functional property violations during the executions of the systems and their components. Method: This paper presents a set of guidelines for the Smart Monitoring Framework definition and its application process. Results and Conclusion: The paper provides the reference architecture of the Smart Monitoring Framework and its possible implementation to promptly detect suspicious behavior or property violations. The paper also illustrates how the provided implementation satisfies the defined guidelines by design.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"15 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140156892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting multimodal biometrics for enhancing password security 利用多模态生物识别技术提高密码安全性
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-16 DOI: 10.1093/jigpal/jzae009
Konstantinos Karampidis
Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to their convenience of use and ease of hardware installation. Many biometric-based authentication schemes were proposed, but despite the advantages that they offer, recent research has shown that biometrics by itself cannot be considered as an inviolable technique. Recently, we have proposed StegoPass, a novel method that obtains the 68 facial points of a user and utilizes them as a stego message to an image. This produced stego image was the password. Although the experiments conducted showed maximum security, it would be challenging to enhance the robustness of the proposed model for even more attacks. This paper examines the utilization of multimodal biometrics as the secret message embedded in the image. More specifically, besides the extraction of the facial points, we extract the unique minutiae moments and combine them in a feature vector. This feature vector is then embedded in the image. Two different datasets were used, and the security of the method was tested against state-of-the-art deep learning models, i.e. generative adversarial networks, to test whether the image could be digitally synthesized and fool the proposed verification scheme. The results proved that the new enhanced version of StegoPass offers an extremely secure method as its predecessor.
每个日常程序的数字化都需要值得信赖的验证方案。人们往往会忽视他们所使用的密码的安全性,即在不同场合使用相同的密码、忽视定期更改密码或经常忘记密码。这就提出了一个重大的安全问题,尤其是对于不熟悉现代技术及其风险和挑战的老年人来说。为了克服这些弊端,人们开始使用生物识别因素,由于其使用方便、硬件安装简单,如今已被广泛采用。人们提出了许多基于生物识别技术的身份验证方案,但尽管这些方案具有诸多优势,最近的研究表明,生物识别技术本身并不能被视为一种不可侵犯的技术。最近,我们提出了一种新方法 StegoPass,它能获取用户的 68 个面部点,并将其作为图像的隐密信息。生成的偷窃图像就是密码。尽管所进行的实验显示了最大的安全性,但要提高所提出模型的鲁棒性以应对更多的攻击仍具有挑战性。本文研究了如何利用多模态生物识别技术将密文嵌入图像。更具体地说,除了提取面部点之外,我们还提取了独特的特征点时刻,并将它们组合成一个特征向量。然后将该特征向量嵌入图像中。我们使用了两个不同的数据集,并用最先进的深度学习模型(即生成式对抗网络)对该方法的安全性进行了测试,以检验图像是否能被数字合成,以及是否能骗过所提出的验证方案。结果证明,新的增强版 StegoPass 与前者一样,提供了一种极其安全的方法。
{"title":"Exploiting multimodal biometrics for enhancing password security","authors":"Konstantinos Karampidis","doi":"10.1093/jigpal/jzae009","DOIUrl":"https://doi.org/10.1093/jigpal/jzae009","url":null,"abstract":"Digitization of every daily procedure requires trustworthy verification schemes. People tend to overlook the security of the passwords they use, i.e. they use the same password on different occasions, they neglect to change them periodically or they often forget them. This raises a major security issue, especially for elderly people who are not familiar with modern technology and its risks and challenges. To overcome these drawbacks, biometric factors were utilized, and nowadays, they have been widely adopted due to their convenience of use and ease of hardware installation. Many biometric-based authentication schemes were proposed, but despite the advantages that they offer, recent research has shown that biometrics by itself cannot be considered as an inviolable technique. Recently, we have proposed StegoPass, a novel method that obtains the 68 facial points of a user and utilizes them as a stego message to an image. This produced stego image was the password. Although the experiments conducted showed maximum security, it would be challenging to enhance the robustness of the proposed model for even more attacks. This paper examines the utilization of multimodal biometrics as the secret message embedded in the image. More specifically, besides the extraction of the facial points, we extract the unique minutiae moments and combine them in a feature vector. This feature vector is then embedded in the image. Two different datasets were used, and the security of the method was tested against state-of-the-art deep learning models, i.e. generative adversarial networks, to test whether the image could be digitally synthesized and fool the proposed verification scheme. The results proved that the new enhanced version of StegoPass offers an extremely secure method as its predecessor.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"96 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Good practices in designing a communication channel architecture for secure async flexible distributed collaboration 设计用于安全异步灵活分布式协作的通信渠道架构的良好实践
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-15 DOI: 10.1093/jigpal/jzae012
Rudolf Erdei, Daniela Delinschi, Oliviu Matei, Laura Andreica
In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of Things (IoT). The architecture was developed and implemented as part of the BIECO project, and is based around open standards such as Open Platform Communications United Architecture (OPC-UA). The key feature of the architecture is that it enables secure asynchronous near-real-time communication between a large number of nodes in a multimodal setup, without the need of any Service to know its place within the tool-chain. Based on our experience with building this system and based on the good results obtained, we are presenting a list of lessons learnt, recommendations for better communication channel modules within loosely coupled distributed systems.
在本文中,我们介绍了一套设计以安全为中心的通信通道架构的良好实践,该架构可用于在不可靠的通信介质上确保松耦合分布式平台的安全。所提出的实践源于设计一个完整的架构,该架构是模块化的,旨在支持面向服务架构(SOA)的原则和广泛应用的共同功能要求,包括网络安全、智能电网和工业物联网(IoT)。该架构是作为 BIECO 项目的一部分开发和实施的,以开放平台通信联合架构(OPC-UA)等开放标准为基础。该架构的主要特点是,它能在多模式设置中的大量节点之间实现安全的异步近实时通信,而无需任何服务了解其在工具链中的位置。根据我们构建该系统的经验和所取得的良好成果,我们将为松散耦合分布式系统中更好的通信渠道模块提出一系列经验教训和建议。
{"title":"Good practices in designing a communication channel architecture for secure async flexible distributed collaboration","authors":"Rudolf Erdei, Daniela Delinschi, Oliviu Matei, Laura Andreica","doi":"10.1093/jigpal/jzae012","DOIUrl":"https://doi.org/10.1093/jigpal/jzae012","url":null,"abstract":"In this paper we present a set of good practices in the design of a security-centric architecture for a Communication Channel that can be used to secure a Loosely-Coupled distributed platform, over unreliable communication mediums. The proposed practices are derived from designing a complete architecture that is modular and designed to support principles of Service Oriented Architecture (SOA) and the common functional requirements of a wide range of applications, including cybersecurity, smart power grids and industrial Internet of Things (IoT). The architecture was developed and implemented as part of the BIECO project, and is based around open standards such as Open Platform Communications United Architecture (OPC-UA). The key feature of the architecture is that it enables secure asynchronous near-real-time communication between a large number of nodes in a multimodal setup, without the need of any Service to know its place within the tool-chain. Based on our experience with building this system and based on the good results obtained, we are presenting a list of lessons learnt, recommendations for better communication channel modules within loosely coupled distributed systems.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symmetric and conflated intuitionistic logics 对称直观逻辑和混淆直观逻辑
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-04 DOI: 10.1093/jigpal/jzae001
Norihiro Kamide
Two new propositional non-classical logics, referred to as symmetric intuitionistic logic (SIL) and conflated intuitionistic logic (CIL), are introduced as indexed and non-indexed Gentzen-style sequent calculi. SIL is regarded as a natural hybrid logic combining intuitionistic and dual-intuitionistic logics, whereas CIL is regarded as a variant of intuitionistic paraconsistent logic with conflation and without paraconsistent negation. The cut-elimination theorems for SIL and CIL are proved. CIL is shown to be conservative over SIL.
本文介绍了两种新的命题非经典逻辑,分别称为对称直觉逻辑(SIL)和混同直觉逻辑(CIL),作为有索引和无索引的根岑式序列计算。SIL 被视为结合了直观逻辑和双直观逻辑的自然混合逻辑,而 CIL 则被视为直观准一致逻辑的一种变体,具有混淆性,但没有准一致的否定。证明了 SIL 和 CIL 的割除定理。证明了 CIL 比 SIL 保守。
{"title":"Symmetric and conflated intuitionistic logics","authors":"Norihiro Kamide","doi":"10.1093/jigpal/jzae001","DOIUrl":"https://doi.org/10.1093/jigpal/jzae001","url":null,"abstract":"Two new propositional non-classical logics, referred to as symmetric intuitionistic logic (SIL) and conflated intuitionistic logic (CIL), are introduced as indexed and non-indexed Gentzen-style sequent calculi. SIL is regarded as a natural hybrid logic combining intuitionistic and dual-intuitionistic logics, whereas CIL is regarded as a variant of intuitionistic paraconsistent logic with conflation and without paraconsistent negation. The cut-elimination theorems for SIL and CIL are proved. CIL is shown to be conservative over SIL.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"39 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140037889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Base-extension semantics for modal logic 模态逻辑的基扩展语义
IF 1 4区 数学 Q2 LOGIC Pub Date : 2024-03-02 DOI: 10.1093/jigpal/jzae004
Timo Eckhardt, David J Pym
In proof-theoretic semantics, meaning is based on inference. It may seen as the mathematical expression of the inferentialist interpretation of logic. Much recent work has focused on base-extension semantics, in which the validity of formulas is given by an inductive definition generated by provability in a ‘base’ of atomic rules. Base-extension semantics for classical and intuitionistic propositional logic have been explored by several authors. In this paper, we develop base-extension semantics for the classical propositional modal systems $K$, $KT$, $K4$ and $S4$, with $square $ as the primary modal operator. We establish appropriate soundness and completeness theorems and establish the duality between $square $ and a natural presentation of $lozenge $. We also show that our semantics is in its current form not complete with respect to euclidean modal logics. Our formulation makes essential use of relational structures on bases.
在证明论语义学中,意义是以推理为基础的。它可以被视为逻辑推论主义解释的数学表达。最近的许多工作都集中在基数扩展语义学上,在这种语义学中,公式的有效性是由原子规则 "基数 "中的可证明性产生的归纳定义给出的。经典命题逻辑和直觉命题逻辑的基扩展语义学已被多位学者探索过。在本文中,我们为经典命题模态系统 $K$、$KT$、$K4$ 和 $S4$ 开发了基扩展语义,并以 $square $ 作为主要模态算子。我们建立了适当的健全性和完备性定理,并建立了$square $与$lozenge $的自然呈现之间的对偶性。我们还证明了我们目前的语义形式对于欧几里得模态逻辑并不完整。我们的表述主要使用了基上的关系结构。
{"title":"Base-extension semantics for modal logic","authors":"Timo Eckhardt, David J Pym","doi":"10.1093/jigpal/jzae004","DOIUrl":"https://doi.org/10.1093/jigpal/jzae004","url":null,"abstract":"In proof-theoretic semantics, meaning is based on inference. It may seen as the mathematical expression of the inferentialist interpretation of logic. Much recent work has focused on base-extension semantics, in which the validity of formulas is given by an inductive definition generated by provability in a ‘base’ of atomic rules. Base-extension semantics for classical and intuitionistic propositional logic have been explored by several authors. In this paper, we develop base-extension semantics for the classical propositional modal systems $K$, $KT$, $K4$ and $S4$, with $square $ as the primary modal operator. We establish appropriate soundness and completeness theorems and establish the duality between $square $ and a natural presentation of $lozenge $. We also show that our semantics is in its current form not complete with respect to euclidean modal logics. Our formulation makes essential use of relational structures on bases.","PeriodicalId":51114,"journal":{"name":"Logic Journal of the IGPL","volume":"15 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140017349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Logic Journal of the IGPL
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1