Abstract
In this paper we address the problem of identifying what local properties the sub-components of a system have to satisfy in order to guarantee a (security) property on the behaviour of the whole system. We associate each action with a value. Hence, we end up with quantitative properties on them, which are specified through a modal logic equipped with a parametric algebraic structure (i.e., a c-semiring). The aim is to have a value related to the satisfaction of a formula. Starting from the behaviour of a general distributed system (or context), we propose a formal approach to decompose a global quantitative property into the local quantitative properties to be satisfied by its sub-contexts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Boolean c-semirings can be used to model crisp problems.
- 2.
\(\mathbb K\) is complete if it is closed with respect to infinite sums, and the distributivity law holds also for an infinite number of summands [2].
- 3.
It is worth noting that this follows the notion of weakly validity introduced in [11].
- 4.
At this level, we are not interested in values \(t,t_{1},t_{2}\) and so on, hence we do not calculate their exact value as the product of \(k_{a}\) and \(k_{b}\).
References
Bartocci, E., Bortolussi, L., Nenzi, L., Sanguinetti, G.: On the robustness of temporal properties for stochastic models. In: 2nd International Workshop on Hybrid Systems and Biology, EPTCS, vol. 125, pp. 3–19 (2013)
Bistarelli, S., Gadducci, F.: Enhancing constraints manipulation in semiring-based formalisms. In: ECAI, pp. 63–67 (2006)
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based constraint satisfaction and optimization. J. ACM 44(2), 201–236 (1997)
Bistarelli, S., Santini, F.: Two trust networks in one: using bipolar structures to fuse trust and distrust. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp. 383–390. IEEE (2014)
Bistarelli, S., Santini, F., Martinelli, F., Matteucci, I.: Automated adaptation via quantitative partial model checking. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp. 1993–1996. ACM (2016)
Blyth, T.S., Janowitz, M.F.: Residuation Theory, vol. 102. Pergamon press, Oxford (1972)
Faella, M., Legay, A., Stoelinga, M.: Model checking quantitative linear time logic. ENTCS 220(3), 61–77 (2008)
Gardelli, L., Viroli, M., Omicini, A.: Design patterns for self-organising systems. In: Burkhard, H.-D., Lindemann, G., Verbrugge, R., Varga, L.Z. (eds.) CEEMAS 2007. LNCS, vol. 4696, pp. 123–132. Springer, Heidelberg (2007)
Golan, J.: Semirings and Affine Equations Over Them: Theory and Applications. Kluwer Academic Pub., Dordrecht (2003)
Juhl, L., Larsen, K.G., Srba, J.: Modal transition systems with weight intervals. J. Log. Algebr. Program. 81(4), 408–421 (2012)
Larsen, K.G., Xinxin, L.: Compositionality through an operational semantics of contexts. J. Logic Comput. 1(6), 761–795 (1991)
Li, J., Yarvis, M., Reiher, P.: Securing distributed adaptation. Comput. Netw. 38(3), 347–371 (2002)
Lluch-Lafuente, A., Montanari, U.: Quantitative mu-calculus and CTL defined over constraint semirings. TCS 346(1), 135–160 (2005)
Martín, J.A., Martinelli, F., Pimentel, E.: Synthesis of secure adaptors. J. Log. Algebr. Program. 81(2), 99–126 (2012)
Martinelli, F., Matteucci, I., Santini, F.: Semiring-based specification approaches for quantitative security. In: Proceedings Thirteenth Workshop on Quantitative Aspects of Programming Languages and Systems, QAPL, EPTCS, vol. 194, pp. 95–109 (2015)
Martinelli, F., Matteucci, I., Santini, F.: There are two sides to every question. In: Bodei, C., Ferrari, G.-L., Priami, C. (eds.) Programming Languages with Applications to Biology and Security. LNCS, vol. 9465, pp. 304–318. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25527-9_20
Splunter, S., Wijngaards, N.J.E., Brazier, F.M.T.: Structuring agents for adaptation. In: Alonso, E., Kudenko, D., Kazakov, D. (eds.) AAMAS 2001-2002. LNCS, vol. 2636, pp. 174–186. Springer, Heidelberg (2003). doi:10.1007/3-540-44826-8_11
Viganò, L.: Automated security protocol analysis with the AVISPA tool. ENTCS 155, 69–86 (2006)
De Wolf, T., Holvoet, T.: Design patterns for decentralised coordination in self-organising emergent systems. In: Brueckner, S.A., Hassas, S., Jelasity, M., Yamins, D. (eds.) ESOA 2006. LNCS, vol. 4335, pp. 28–49. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Matteucci, I., Santini, F. (2016). Decomposing Global Quantitative Properties into Local Ones. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-47072-6_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47071-9
Online ISBN: 978-3-319-47072-6
eBook Packages: Computer ScienceComputer Science (R0)