Information flow techniques typically classify information according to suitable security levels and enforce policies that are based on binary relations between individual levels, e.g., stating that information is allowed to flow from one level to another. We argue that some information flow properties of interest naturally require coordination patterns that involve sets of security levels rather than individual levels: some secret information could be safely disclosed to a set of confidential channels of incomparable security levels, with individual leaks considered instead illegal; a group of competing agencies might agree to disclose their secrets, with individual disclosures being undesired, etc. Motivated by this we propose a simple language for expressing information flow policies where the usual admitted flow relation between individual security lev- els is replaced by a relation between sets of security levels, thus allowing to capture coordinated flows of information. The flow of information is expressed in terms of causal dependencies and the satisfaction of a policy is defined with respect to an event structure that is assumed to capture the causal structure of system computations. We suggest applications to secret exchange protocols, program security and security architectures, and discuss the relation to classic notions of information flow control.
AI in between online and offline discourse - and what has ChatGPT to do with ...Stefan Dietze
Talk at Bonn University on general AI and NLP challenges in the context of online discourse analysis. Specific focus on challenges arising from the widespread adoption of neural large language models.
Data Science Salon: An Experiment on Data Science Algorithms Enabled by a Pil...Formulatedby
Pilosa, as a technology, changes the dialog around large data sets, both static and in motion. Historically data lakes like Hadoop have been used to store massive amounts of data. However, it is estimated that only 20% of that data is practically analyzable because complex analytical operations on an ad-hoc basis become computationally painful and slow.
Next DSS MIA Event - https://datascience.salon/miami/
Next DSS AUS Event - https://datascience.salon/austin/
Enter a distributed binary index: Pilosa. While this can be used to unlock and join massive datasets and streams, it can also be thought of as an accelerator for training Machine Learning models and most importantly running your algorithms in large scale production environments. In this workshop Hypergiant will discuss how Pilosa interacts with several ML ideas including the Winnow algorithm, association schemes, and recommendation engines.
Making Sense of Statistics in HCI: From P to Bayes and Beyond – introductionAlan Dix
Many find statistics confusing, and perhaps more so given recent publicity of problems with traditional p-values and alternative statistical techniques including confidence intervals and Bayesian statistics. This course aims to help attendees navigate this morass: to understand the debates and more importantly make appropriate choices when designing and analysing experiments, empirical studies and other forms of quantitative data.
Stolz, Simon / Schlereth, Christian (2021): "Predicting Tie Strength with Ego Network Structures", Journal of Interactive Marketing, 54(May): 40-52.
Not all social media “friends” are close friends but distinguishing them from mere acquaintances is an important task in marketing. The notion of a close friend is reflected in the metric tie strength, but the true tie strength is often unobserved in online social networks. With this research, we propose an approach that predicts real-world tie strength via online da-ta measures of similarity, interaction, and network data. At its core, we assess ego network structures to predict tie strength, i.e., all first-degree connections and the interlinkage among them. Ego networks are easier to obtain than full networks, and researchers can process them more efficiently. We explain why bridging ego network positions could be associated with real-world tie strength and demonstrate the high discriminatory power of related network measures. In combination with similarity and interaction measures, the precision of identifying real-world strong ties is 45%. Finally, we empirically highlight the practical relevance of this finding by demonstrating that people react stronger to suggestions of a close friend com-pared to an acquaintance in a social advertisement experiment.
AI in between online and offline discourse - and what has ChatGPT to do with ...Stefan Dietze
Talk at Bonn University on general AI and NLP challenges in the context of online discourse analysis. Specific focus on challenges arising from the widespread adoption of neural large language models.
Data Science Salon: An Experiment on Data Science Algorithms Enabled by a Pil...Formulatedby
Pilosa, as a technology, changes the dialog around large data sets, both static and in motion. Historically data lakes like Hadoop have been used to store massive amounts of data. However, it is estimated that only 20% of that data is practically analyzable because complex analytical operations on an ad-hoc basis become computationally painful and slow.
Next DSS MIA Event - https://datascience.salon/miami/
Next DSS AUS Event - https://datascience.salon/austin/
Enter a distributed binary index: Pilosa. While this can be used to unlock and join massive datasets and streams, it can also be thought of as an accelerator for training Machine Learning models and most importantly running your algorithms in large scale production environments. In this workshop Hypergiant will discuss how Pilosa interacts with several ML ideas including the Winnow algorithm, association schemes, and recommendation engines.
Making Sense of Statistics in HCI: From P to Bayes and Beyond – introductionAlan Dix
Many find statistics confusing, and perhaps more so given recent publicity of problems with traditional p-values and alternative statistical techniques including confidence intervals and Bayesian statistics. This course aims to help attendees navigate this morass: to understand the debates and more importantly make appropriate choices when designing and analysing experiments, empirical studies and other forms of quantitative data.
Stolz, Simon / Schlereth, Christian (2021): "Predicting Tie Strength with Ego Network Structures", Journal of Interactive Marketing, 54(May): 40-52.
Not all social media “friends” are close friends but distinguishing them from mere acquaintances is an important task in marketing. The notion of a close friend is reflected in the metric tie strength, but the true tie strength is often unobserved in online social networks. With this research, we propose an approach that predicts real-world tie strength via online da-ta measures of similarity, interaction, and network data. At its core, we assess ego network structures to predict tie strength, i.e., all first-degree connections and the interlinkage among them. Ego networks are easier to obtain than full networks, and researchers can process them more efficiently. We explain why bridging ego network positions could be associated with real-world tie strength and demonstrate the high discriminatory power of related network measures. In combination with similarity and interaction measures, the precision of identifying real-world strong ties is 45%. Finally, we empirically highlight the practical relevance of this finding by demonstrating that people react stronger to suggestions of a close friend com-pared to an acquaintance in a social advertisement experiment.
Talk at the Informatics Colloquium at LMU München.
Abstract: Aggregation plays a central role in many computational paradigms and their applications. Classical examples are fold/reduce functions in functional programming, reduce/gather operations in parallel programming, and set functions in database programming. Aggregation is essential as well in many of today's IT trends, from Big (Graph) Data analytics to coordination of devices and services in complex distributed systems such as the Internet-of-Things. Aggregate programming models, languages and techniques are indeed a current topic of research in several communities. I will discuss how a soft variant of a modal logic can provide a convenient declarative approach to aggregate programming and I will mention applications to distributed coordination of agents and to distributed graph analytics.
My presentation in the idea4cps.dk workshop held in Aalborg. Its about a semiring-valued temporal logic that me and Ugo Montanari developed some years ago. The logic is essentially a generalisation of CTL interpreted over absorptive semirings, an algebraic structure that is quite suitable to model quantitative aspects such as quality-of-service measures.
Can we efficiently verify concurrent programs under relaxed memory models in ...Alberto Lluch Lafuente
Relaxed memory models offer suitable abstractions of the actual optimizations offered by multi-core architectures and by compilers of concurrent programming languages. Using such abstractions for verification purposes is challenging in part since they introduce yet another source of high non-determinism, thus contributing to the state explosion problem. In the last years several techniques have been proposed to mitigate those problems so to make verification under relaxed memory models feasible. In this talk I present some of those techniques and discuss if and how those techniques can be adopted in Maude or Maude-based verification tools.
Collaborative Task Execution In Volunteer Clouds (or how to choose a sub-revi...Alberto Lluch Lafuente
My talk at the 2nd General Meeting of the CINA project, Bologna, 18-20 Feb 2014.
The increasing diffusion of cloud technologies offers new opportunities for distributed and collaborative computing. Volunteer clouds are a prominent example, where participants join and leave the platform and collaborate by sharing computational resources. The high complexity, dynamism and unpredictability of such scenarios call for decentralized self-* approaches. We present in this paper a framework for the design and evaluation of self-adaptive collaborative task execution strategies in volunteer clouds. As a byproduct, we propose a novel strategy based on the Ant Colony Optimization paradigm, that we validate through simulation-based statistical analysis over Google workload data.
My talk on "State Space C-Reductions for Concurrent Systems in Rewriting Logic" held at the International ETAPS Workshop on Graph Inspection and Traversal Engineering (GRAPHITE 2013).
Full manuscript available here: http://eprints.imtlucca.it/1350/
State Space c-Reductions of Concurrent Systems in Rewriting Logic @ ETAPS Wor...Alberto Lluch Lafuente
We present c-reductions, a state space reduction technique. The rough idea is to exploit some equivalence relation on states (possibly capturing system regularities) that preserves behavioral properties, and explore the induced quotient system. This is done by means of a canonizer function, which maps each state into one (of the) canonical representative(s) of its equivalence class. The approach exploits the expressiveness of rewriting logic and its realization in Maude to enjoy several advantages over similar approaches: flexibility and simplicity in the definition of the reductions (supporting not only traditional symmetry reductions, but also name reuse and name abstraction); reasoning support for checking and proving correctness of the reductions; and automatization of the reduction infrastructure via Maude's meta-programming features. The approach has been validated over a set of representative case studies, exhibiting comparable results with respect to other tools.
Evaluating the performance of model transformation styles with Maude @ Sympos...Alberto Lluch Lafuente
Rule-based programming has been shown to be very successful in many application areas. Two prominent examples are the specification of model transformations in model driven development approaches and the definition of structured operational semantics of formal languages. General rewriting frameworks such as Maude are flexible enough to allow the programmer to adopt and mix various rule styles. The choice between styles can be biased by the programmer's background. For instance, experts in visual formalisms might prefer graph-rewriting styles, while experts in semantics might prefer structurally inductive rules. This paper evaluates the performance of different rule styles on a significant benchmark taken from the literature on model transformation. Depending on the actual transformation being carried out, our results show that different rule styles can offer drastically different performances. We point out the situations from which each rule style benefits to offer a valuable set of hints for choosing one style over the other.
We define an algebraic theory of hierarchical graphs, whose equational part characterises graph isomorphism, i.e. it is formed by a sound and complete set of axioms equating two terms whenever they represent the same hierarchical graph. Our algebra can thus be understood as a high-level language for describing graphs with a nested structure, and is then particularly suited for the visual specication of process calculi with inherently hierarchical features such as sessions, transactions or locations. We illustrate our approach by encoding CaSPiS, a recently proposed session-centered calculus.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...Travis Hills MN
Travis Hills of Minnesota developed a method to convert waste into high-value dry fertilizer, significantly enriching soil quality. By providing farmers with a valuable resource derived from waste, Travis Hills helps enhance farm profitability while promoting environmental stewardship. Travis Hills' sustainable practices lead to cost savings and increased revenue for farmers by improving resource efficiency and reducing waste.
Talk at the Informatics Colloquium at LMU München.
Abstract: Aggregation plays a central role in many computational paradigms and their applications. Classical examples are fold/reduce functions in functional programming, reduce/gather operations in parallel programming, and set functions in database programming. Aggregation is essential as well in many of today's IT trends, from Big (Graph) Data analytics to coordination of devices and services in complex distributed systems such as the Internet-of-Things. Aggregate programming models, languages and techniques are indeed a current topic of research in several communities. I will discuss how a soft variant of a modal logic can provide a convenient declarative approach to aggregate programming and I will mention applications to distributed coordination of agents and to distributed graph analytics.
My presentation in the idea4cps.dk workshop held in Aalborg. Its about a semiring-valued temporal logic that me and Ugo Montanari developed some years ago. The logic is essentially a generalisation of CTL interpreted over absorptive semirings, an algebraic structure that is quite suitable to model quantitative aspects such as quality-of-service measures.
Can we efficiently verify concurrent programs under relaxed memory models in ...Alberto Lluch Lafuente
Relaxed memory models offer suitable abstractions of the actual optimizations offered by multi-core architectures and by compilers of concurrent programming languages. Using such abstractions for verification purposes is challenging in part since they introduce yet another source of high non-determinism, thus contributing to the state explosion problem. In the last years several techniques have been proposed to mitigate those problems so to make verification under relaxed memory models feasible. In this talk I present some of those techniques and discuss if and how those techniques can be adopted in Maude or Maude-based verification tools.
Collaborative Task Execution In Volunteer Clouds (or how to choose a sub-revi...Alberto Lluch Lafuente
My talk at the 2nd General Meeting of the CINA project, Bologna, 18-20 Feb 2014.
The increasing diffusion of cloud technologies offers new opportunities for distributed and collaborative computing. Volunteer clouds are a prominent example, where participants join and leave the platform and collaborate by sharing computational resources. The high complexity, dynamism and unpredictability of such scenarios call for decentralized self-* approaches. We present in this paper a framework for the design and evaluation of self-adaptive collaborative task execution strategies in volunteer clouds. As a byproduct, we propose a novel strategy based on the Ant Colony Optimization paradigm, that we validate through simulation-based statistical analysis over Google workload data.
My talk on "State Space C-Reductions for Concurrent Systems in Rewriting Logic" held at the International ETAPS Workshop on Graph Inspection and Traversal Engineering (GRAPHITE 2013).
Full manuscript available here: http://eprints.imtlucca.it/1350/
State Space c-Reductions of Concurrent Systems in Rewriting Logic @ ETAPS Wor...Alberto Lluch Lafuente
We present c-reductions, a state space reduction technique. The rough idea is to exploit some equivalence relation on states (possibly capturing system regularities) that preserves behavioral properties, and explore the induced quotient system. This is done by means of a canonizer function, which maps each state into one (of the) canonical representative(s) of its equivalence class. The approach exploits the expressiveness of rewriting logic and its realization in Maude to enjoy several advantages over similar approaches: flexibility and simplicity in the definition of the reductions (supporting not only traditional symmetry reductions, but also name reuse and name abstraction); reasoning support for checking and proving correctness of the reductions; and automatization of the reduction infrastructure via Maude's meta-programming features. The approach has been validated over a set of representative case studies, exhibiting comparable results with respect to other tools.
Evaluating the performance of model transformation styles with Maude @ Sympos...Alberto Lluch Lafuente
Rule-based programming has been shown to be very successful in many application areas. Two prominent examples are the specification of model transformations in model driven development approaches and the definition of structured operational semantics of formal languages. General rewriting frameworks such as Maude are flexible enough to allow the programmer to adopt and mix various rule styles. The choice between styles can be biased by the programmer's background. For instance, experts in visual formalisms might prefer graph-rewriting styles, while experts in semantics might prefer structurally inductive rules. This paper evaluates the performance of different rule styles on a significant benchmark taken from the literature on model transformation. Depending on the actual transformation being carried out, our results show that different rule styles can offer drastically different performances. We point out the situations from which each rule style benefits to offer a valuable set of hints for choosing one style over the other.
We define an algebraic theory of hierarchical graphs, whose equational part characterises graph isomorphism, i.e. it is formed by a sound and complete set of axioms equating two terms whenever they represent the same hierarchical graph. Our algebra can thus be understood as a high-level language for describing graphs with a nested structure, and is then particularly suited for the visual specication of process calculi with inherently hierarchical features such as sessions, transactions or locations. We illustrate our approach by encoding CaSPiS, a recently proposed session-centered calculus.
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Travis Hills' Endeavors in Minnesota: Fostering Environmental and Economic Pr...Travis Hills MN
Travis Hills of Minnesota developed a method to convert waste into high-value dry fertilizer, significantly enriching soil quality. By providing farmers with a valuable resource derived from waste, Travis Hills helps enhance farm profitability while promoting environmental stewardship. Travis Hills' sustainable practices lead to cost savings and increased revenue for farmers by improving resource efficiency and reducing waste.
Remote Sensing and Computational, Evolutionary, Supercomputing, and Intellige...University of Maribor
Slides from talk:
Aleš Zamuda: Remote Sensing and Computational, Evolutionary, Supercomputing, and Intelligent Systems.
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Inter-Society Networking Panel GRSS/MTT-S/CIS Panel Session: Promoting Connection and Cooperation
https://www.etran.rs/2024/en/home-english/
What is greenhouse gasses and how many gasses are there to affect the Earth.moosaasad1975
What are greenhouse gasses how they affect the earth and its environment what is the future of the environment and earth how the weather and the climate effects.
hematic appreciation test is a psychological assessment tool used to measure an individual's appreciation and understanding of specific themes or topics. This test helps to evaluate an individual's ability to connect different ideas and concepts within a given theme, as well as their overall comprehension and interpretation skills. The results of the test can provide valuable insights into an individual's cognitive abilities, creativity, and critical thinking skills
Toxic effects of heavy metals : Lead and Arsenicsanjana502982
Heavy metals are naturally occuring metallic chemical elements that have relatively high density, and are toxic at even low concentrations. All toxic metals are termed as heavy metals irrespective of their atomic mass and density, eg. arsenic, lead, mercury, cadmium, thallium, chromium, etc.
Nucleophilic Addition of carbonyl compounds.pptxSSR02
Nucleophilic addition is the most important reaction of carbonyls. Not just aldehydes and ketones, but also carboxylic acid derivatives in general.
Carbonyls undergo addition reactions with a large range of nucleophiles.
Comparing the relative basicity of the nucleophile and the product is extremely helpful in determining how reversible the addition reaction is. Reactions with Grignards and hydrides are irreversible. Reactions with weak bases like halides and carboxylates generally don’t happen.
Electronic effects (inductive effects, electron donation) have a large impact on reactivity.
Large groups adjacent to the carbonyl will slow the rate of reaction.
Neutral nucleophiles can also add to carbonyls, although their additions are generally slower and more reversible. Acid catalysis is sometimes employed to increase the rate of addition.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...
Many-to-Many Information Flow Policies
1. Many-to-Many Information Flow Policies
Paolo Baldan
Università di Padova
Alessandro Beggiato
IMT Lucca
Alberto Lluch Lafuente
DTU
albl@dtu.dk
DisCoTec/COORDINATION 2017, Neuchâtel, 19-22 June 2017
7. SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Sometimes one-to-one relations are not enough…
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
For example, to admit only…
• Paths ENGINE CONTROL→NET→ENGINE
• Flows {SECRET,DECLASSIF.} → PUBLIC
• Flows from {SECRET} → {PUB1,PUB2}NETWORK
ENGINE
INFOTAINMENT
CONTROL
ENGINE
CONTROL
SCREENS
8. SECRET
PUBLIC
SECRET
PUBLIC
DECLASSIFIER
MANAGEMENT
PUBLIC
FINANCIALMEDICAL
Sometimes one-to-one relations are not enough…
For example, to admit only…
• Paths ENGINE CONTROL→NET→ENGINE
• Flows {SECRET,DECLASSIF.} → PUBLIC
• Flows from {SECRET} → {PUB1,PUB2}
What does this mean at all?
How to regulate such flows?
How to keep a visual/intuitive notation?
Information flow policies regulate how information flows between
several security domains. Such policies may be diagrams like:
NETWORK
ENGINE
INFOTAINMENT
CONTROL
ENGINE
CONTROL
SCREENS
9. Plan for today:
• Information flow and causality
• Why collective/simultaneous flows?
• Semantics of policies, by examples
• Some results
• Conclusion
11. Alice Bob
Information flow and causal dependencies
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
...
...
12. Alice Bob
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
communication flow
...
...
Information flow and causal dependencies
13. Alice Bob
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
communication flow
explicit data flow...
...
Information flow and causal dependencies
14. Alice Bob
send(x);
u := 0;
if g(y) then
z := f(y);
recv(?y);
INTUITION: “if b depends on a then there is some flow from a to b”
communication flow
explicit data flow
implicit data flow
...
...
Information flow and causal dependencies
15. Our models are labelled event structures, which consist of:
16. H L
Our models are labelled event structures, which consist of:
a set of security labels
19. disclose
read
L
request_secret
listen
ignore
Our models are labelled event structures, which consist of:
a relation modelling causality (reflexive, transitive)
another relation modelling conflicts
(irreflexive, symmetric, inherited through causality)
a set of security labels
a set of events
H
21. A model satisfies the policy if every direct causal dependency
between different levels is justified by the policy.
disclose
H
L
POLICY
read
L
request_secret
listen
ignore
H
justified by
Policies are hyper graphs on the labels
unjustified!
22. A model satisfies the policy if every direct causal dependency
between different levels is justified by the policy.
disclose
H
L
POLICY
read
L
request_secret
listen
ignore
H
justified by
Policies are hyper graphs on the labels
unjustified!
How does this relate to existing approaches? Just restricting to
L→H there a huge families of possible semantics.
23. BNDC
(bisimulation-based NI)
RBNI
(structural NI)
SNNI
(trace-based NI)
[N. Busi, R. Gorrieri, “Structural non-interference in elementary and trace nets”, Mathematical Structures in Computer Science, 2009]
[N. Busi, R. Gorrieri, “A survey of non-interference with Petri nets”, Lectures on Concurrency and Petri Nets 2003]
[R. Focardi, R. Gorrieri, “A Classification of Security Properties”, Journal of Computer Security, 1995]
• no H→L dependencies
• no H-L conflicts
Some notions of non-interference (allow L→H only) for safe Petri nets
• no H→L dependencies
• no direct H-L conflicts
• no H→L dependencies
( this paper)
25. l l
h
l l’
h
System Low view
(only L)
Low view
(L+H)
l l’
h
l
lh
Event
Structure
PetriNetTransition
System
Traces
l
l l
l’
l l’ l l’
l l’
Observational NI miss some H-L conflicts
(L may guess non occurrence of H-events)
40. A
Flows allowed by a policy {A,B} E
B
A
E
B
POLICY
E
a
e
IDEA: A direct causality a e is allowed if …
41. A B
A
E
B
POLICY
E
a b
e
IDEA: A direct causality a e is allowed if it occurs in a context like this
INTUITION: Every time E listens to A, it also
needs to listen to B.
Flows allowed by a policy {A,B} E
43. B
A
E
B
POLICY
E
INTUITION: Every time E talks to A, it also talks to B.
B may have other “unrelated” causal or conflict
dependencies.
a b
A
IDEA: A direct causality e a is allowed if it occurs in a context like this
•
e
Flows allowed by a policy E {A,B}
45. B
A
D
B
POLICYC
INTUITION: Every time A talks to B, it also talks to D
and B also talks to C and D.
a b
c
A
IDEA: A direct causality a c is allowed if it occurs in a context like this
•
C
D
d
Flows allowed by a policy {A,B} {C,D}
51. The most restrictive policy for a model may not be unique
A CB
a
c
b
The model satisfies both policies.
None of the policies can be
restricted for this model.
A B
POLICY
C
A B
POLICY
C
Example
52. Decidability for a class of event structures
Key ideas:
• Deciding FOL properties of a regular trace event structures is
decidable [Madhusudan, LICS 2013]
• Policy satisfaction can be encoded in FOL
54. What we have done:
• Focus on causality-based information flows
• Extend one-to-one policies (e.g. H→D→L,…)
• to many-to-many policies (e.g. {H,D}→L, H→{L,D},…)
• Study some semantic/decidability properties
Concluding remarks
55. What we have done:
• Focus on causality-based information flows
• Extend one-to-one policies (e.g. H→D→L,…)
• to many-to-many policies (e.g. {H,D}→L, H→{L,D},…)
• Study some semantic/decidability properties
What else is in the paper?
• Additional coordination constraints on the flows:
• directness
• fairness
• A case study and some application domains
Concluding remarks
56. What we have done:
• Focus on causality-based information flows
• Extend one-to-one policies (e.g. H→D→L,…)
• to many-to-many policies (e.g. {H,D}→L, H→{L,D},…)
• Study some semantic/decidability properties
What else is in the paper?
• Additional coordination constraints on the flows:
• directness
• fairness
• A case study and some application domains
What we are doing:
• More flexible “Causality Patterns” (see talk at ICE 2017)
• Verification for safe Petri nets / Static analysis for programs
• Consider the actual transfer of (the same) information
Concluding remarks