首页 > 最新文献

DOWN BEAT最新文献

英文 中文
Compliance for reversible client/server interactions 可逆客户端/服务器交互的遵从性
3区 艺术学 0 MUSIC Pub Date : 2014-08-25 DOI: 10.4204/EPTCS.162.5
F. Barbanera, M. Dezani-Ciancaglini, Ugo de'Liguoro
In the setting of session behaviours, we study an extension of the concept of compliance when a disciplined form of backtracking is present. After adding checkpoints to the syntax of session behaviours, we formalise the operational semantics via a LTS, and define a natural notion of checkpoint compliance. We then obtain a co-inductive characterisation of such compliance relation, and an axiomatic presentation that is proved to be sound and complete. As a byproduct we get a decision procedure for the new compliance, being the axiomatic system algorithmic. 1 Introduction. In human as well as automatic negotiations, an interesting feature is the ability of rolling back to some previous point, undoing previous choices and possibly trying a different path. Rollbacks are familiar to the users of web browsers, and so are also the troubles that these might cause during “undisciplined” interactions. Clicking the “back” button, or going to some previous point in the chronology when we are in the middle of a transaction, say the booking of a flight, can be as smart as dangerous. In any case it is surely a behaviour that service programmers want to discipline. Also the converse has to be treated with care: a server discovering that a service b ecomes available after having started a conversation could take advantage from some kind of rolling backs. However, such a server would be quite unfair if the rollbacks were completely hidden from the client. Adding rollbacks to interaction protocols requires a sophisticated concept of client/server compliance. In this paper we investigate protocols admitting a simple, though non trivial form of reversibility in the framework of the theory of contracts introduced in [4] and developed in a series of papers, e.g. [5]. We focus here on the scenario of client/server architectures, where services stored in a repository are queried by clients to establish two-sided communications, and the central concept is that of compliance. More precisely, we consider the formalism of session behaviours as introduced in [2, 1, 3], but without delegation. This is a formalism interpreting the sessio n types, introduced by Honda et al. in [7], into a subset of CCS without τ. We extend the session behaviours syntax by means of markers that we call checkpoints; these are intended as pointers to the last place where eithe r the client or the server can roll back at any time. We investigate which constraints must be imposed to obtain a safe notion of client/server interaction in the new scenario, by defining a model in the form of a LTS, and by characterising the resulting concept of compliance both coinductively and axiomatically. Since the axiomatic system is algorithmic that is decidable, the compliance of behaviours with checkpoints is decidable. Before entering into the formal development of session behaviours with checkpoints, we illustrate the basic concepts by discussing a few examples. Suppose that the client is a customer willing to ar
在会话行为的设置中,我们研究了当存在纪律形式的回溯时依从性概念的扩展。在将检查点添加到会话行为的语法之后,我们通过LTS形式化操作语义,并定义检查点遵从性的自然概念。然后,我们得到了这种顺应关系的共归纳表征,并证明了一个公理表示是健全和完整的。作为一个副产品,我们得到了一个新的顺应性的决策过程,即公理系统算法。1介绍。在人类谈判和自动谈判中,一个有趣的特征是能够回滚到之前的某个点,撤销之前的选择,并可能尝试不同的路径。对于web浏览器的用户来说,回滚是很熟悉的,所以在“无序”的交互过程中,回滚可能会引起麻烦。当我们正在进行某项交易(比如预订机票)时,点击“返回”按钮,或者回到时间表的前一点,可能既聪明又危险。无论如何,这肯定是服务程序员想要规范的行为。另外,必须小心处理相反的情况:服务器在启动会话后发现服务b可用,可以从某种回滚中获益。但是,如果对客户机完全隐藏回滚,那么这样的服务器将非常不公平。向交互协议添加回滚需要一个复杂的客户机/服务器遵从性概念。在本文中,我们研究了在[4]中引入并在一系列论文(例如[5])中发展的合约理论框架中允许简单但非平凡形式的可逆性的协议。我们在这里关注客户机/服务器体系结构的场景,其中存储在存储库中的服务由客户机查询以建立双边通信,其中心概念是遵从性。更准确地说,我们考虑在[2,1,3]中引入的会话行为的形式化,但没有委托。这是一种将Honda等人在[7]中引入的会话n类型解释为不含τ的CCS子集的形式主义。我们通过称为检查点的标记扩展会话行为语法;它们被用作指针,指向客户机或服务器可以随时回滚的最后一个位置。我们通过定义LTS形式的模型,并通过协归纳和公理性地描述合规的最终概念,研究了在新场景中必须施加哪些约束才能获得客户/服务器交互的安全概念。由于公理系统是可确定的算法,因此行为与检查点的遵从性是可确定的。在开始正式开发带有检查点的会话行为之前,我们通过讨论几个示例来说明基本概念。假设客户是一个愿意安排的客户*这项工作部分由欧盟合作项目ASCENS 257414, ICT COST Action IC1201 BETTY支持。
{"title":"Compliance for reversible client/server interactions","authors":"F. Barbanera, M. Dezani-Ciancaglini, Ugo de'Liguoro","doi":"10.4204/EPTCS.162.5","DOIUrl":"https://doi.org/10.4204/EPTCS.162.5","url":null,"abstract":"In the setting of session behaviours, we study an extension of the concept of compliance when a disciplined form of backtracking is present. After adding checkpoints to the syntax of session behaviours, we formalise the operational semantics via a LTS, and define a natural notion of checkpoint compliance. We then obtain a co-inductive characterisation of such compliance relation, and an axiomatic presentation that is proved to be sound and complete. As a byproduct we get a decision procedure for the new compliance, being the axiomatic system algorithmic. 1 Introduction. In human as well as automatic negotiations, an interesting feature is the ability of rolling back to some previous point, undoing previous choices and possibly trying a different path. Rollbacks are familiar to the users of web browsers, and so are also the troubles that these might cause during “undisciplined” interactions. Clicking the “back” button, or going to some previous point in the chronology when we are in the middle of a transaction, say the booking of a flight, can be as smart as dangerous. In any case it is surely a behaviour that service programmers want to discipline. Also the converse has to be treated with care: a server discovering that a service b ecomes available after having started a conversation could take advantage from some kind of rolling backs. However, such a server would be quite unfair if the rollbacks were completely hidden from the client. Adding rollbacks to interaction protocols requires a sophisticated concept of client/server compliance. In this paper we investigate protocols admitting a simple, though non trivial form of reversibility in the framework of the theory of contracts introduced in [4] and developed in a series of papers, e.g. [5]. We focus here on the scenario of client/server architectures, where services stored in a repository are queried by clients to establish two-sided communications, and the central concept is that of compliance. More precisely, we consider the formalism of session behaviours as introduced in [2, 1, 3], but without delegation. This is a formalism interpreting the sessio n types, introduced by Honda et al. in [7], into a subset of CCS without τ. We extend the session behaviours syntax by means of markers that we call checkpoints; these are intended as pointers to the last place where eithe r the client or the server can roll back at any time. We investigate which constraints must be imposed to obtain a safe notion of client/server interaction in the new scenario, by defining a model in the form of a LTS, and by characterising the resulting concept of compliance both coinductively and axiomatically. Since the axiomatic system is algorithmic that is decidable, the compliance of behaviours with checkpoints is decidable. Before entering into the formal development of session behaviours with checkpoints, we illustrate the basic concepts by discussing a few examples. Suppose that the client is a customer willing to ar","PeriodicalId":53853,"journal":{"name":"DOWN BEAT","volume":"96 1","pages":"35-42"},"PeriodicalIF":0.0,"publicationDate":"2014-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79463718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"艺术学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Self-Adaptation and Secure Information Flow in Multiparty Structured Communications: A Unified Perspective 多方结构化通信中的自适应和安全信息流:一个统一的视角
3区 艺术学 0 MUSIC Pub Date : 2014-08-25 DOI: 10.4204/EPTCS.162.2
I. Castellani, M. Dezani-Ciancaglini, Jorge A. Pérez
We present initial results on a comprehensive model of structured communications, in which self- adaptation and security concerns are jointly addressed. More specifically, we propose a model of self-adaptive, multiparty communications with secure information flow guarantees. In this model, security violations occur when processes attempt to read or write messages of inappropriate security levels within directed exchanges. Such violations trigger adaptation mechanisms that prevent the violations to occur and/or to propagate their effect in the choreography. Our model is equipped with local and global mechanisms for reacting to security violations; type soundness results ensure that global protocols are still correctly executed, while the system adapts itself to preserve security.
我们提出了一个综合的结构化通信模型的初步结果,其中自适应和安全问题是共同解决的。更具体地说,我们提出了一个具有安全信息流保证的自适应、多方通信模型。在此模型中,当进程试图在定向交换中读取或写入不适当安全级别的消息时,就会发生安全违规。此类违规触发适应机制,以防止违规发生和/或在编排中传播其影响。我们的模型配备了本地和全球机制,以应对违反安全的行为;类型稳健性结果确保全局协议仍然正确执行,同时系统自适应以保持安全性。
{"title":"Self-Adaptation and Secure Information Flow in Multiparty Structured Communications: A Unified Perspective","authors":"I. Castellani, M. Dezani-Ciancaglini, Jorge A. Pérez","doi":"10.4204/EPTCS.162.2","DOIUrl":"https://doi.org/10.4204/EPTCS.162.2","url":null,"abstract":"We present initial results on a comprehensive model of structured communications, in which self- adaptation and security concerns are jointly addressed. More specifically, we propose a model of self-adaptive, multiparty communications with secure information flow guarantees. In this model, security violations occur when processes attempt to read or write messages of inappropriate security levels within directed exchanges. Such violations trigger adaptation mechanisms that prevent the violations to occur and/or to propagate their effect in the choreography. Our model is equipped with local and global mechanisms for reacting to security violations; type soundness results ensure that global protocols are still correctly executed, while the system adapts itself to preserve security.","PeriodicalId":53853,"journal":{"name":"DOWN BEAT","volume":"15 1","pages":"9-18"},"PeriodicalIF":0.0,"publicationDate":"2014-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82447058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"艺术学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Recursive Session Types Revisited 重新访问递归会话类型
3区 艺术学 0 MUSIC Pub Date : 2014-08-25 DOI: 10.4204/EPTCS.162.4
Ornela Dardha
Session types model structured communication-based programming. In particular, binary session types for the pi-calculus describe communication between exactly two participants in a distributed scenario. Adding sessions to the pi-calculus means augmenting it with type and term constructs. In a previous paper, we tried to understand to which extent the session constructs are more complex and expressive than the standard pi-calculus constructs. Thus, we presented an encoding of binary session pi-calculus to the standard typed pi-calculus by adopting linear and variant types and the continuation-passing principle. In the present paper, we focus on recursive session types and we present an encoding into recursive linear pi-types. This encoding is a conservative extension of the former in that it preserves the results therein obtained. Most importantly, it adopts a new treatment of the duality relation, which in the presence of recursive types has been proven to be quite challenging.
会话类型为结构化的基于通信的编程建模。特别是,用于pi演算的二进制会话类型描述了分布式场景中两个参与者之间的通信。向pi-演算中添加会话意味着使用类型和术语结构对其进行扩充。在之前的一篇论文中,我们试图理解会话结构在多大程度上比标准pi-calculus结构更复杂和更有表现力。因此,我们采用线性型和变型以及连续传递原理,将二进制会话pi-微积分编码为标准类型pi-微积分。在本文中,我们关注递归会话类型,并给出递归线性pi类型的编码。这种编码是前者的保守扩展,因为它保留了其中获得的结果。最重要的是,它采用了一种新的处理对偶关系的方法,这种方法在递归类型存在的情况下被证明是相当具有挑战性的。
{"title":"Recursive Session Types Revisited","authors":"Ornela Dardha","doi":"10.4204/EPTCS.162.4","DOIUrl":"https://doi.org/10.4204/EPTCS.162.4","url":null,"abstract":"Session types model structured communication-based programming. In particular, binary session types for the pi-calculus describe communication between exactly two participants in a distributed scenario. Adding sessions to the pi-calculus means augmenting it with type and term constructs. In a previous paper, we tried to understand to which extent the session constructs are more complex and expressive than the standard pi-calculus constructs. Thus, we presented an encoding of binary session pi-calculus to the standard typed pi-calculus by adopting linear and variant types and the continuation-passing principle. In the present paper, we focus on recursive session types and we \u0000present an encoding into recursive linear pi-types. This encoding is a conservative extension of the former in that it preserves the results therein obtained. Most importantly, it adopts a new treatment of the duality relation, which in the presence of recursive types has been proven to be quite challenging.","PeriodicalId":53853,"journal":{"name":"DOWN BEAT","volume":"458 1","pages":"27-34"},"PeriodicalIF":0.0,"publicationDate":"2014-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83069846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"艺术学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
DOWN BEAT
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1