This document summarizes Davide Basile's PhD thesis on specifying and verifying contract-based applications. The thesis introduces contract automata as a novel model for specifying service contracts. Contract automata are finite state automata enhanced to model multiparty service interactions. The thesis defines three key properties for analyzing service agreements - strong agreement, agreement, and weak agreement - and presents techniques for model checking contract automata against these properties using control theory and linear programming. It also explores relating contract automata to logical models and using them for choreographic modeling in service-oriented computing.
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless,
certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the
demands of grid computing. Security and efficiency are the main objectives of grid authentication
protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the bilinear
pairing, that is extremely computational expensive. In this paper, we analyze the recently secure certificateless
key agreement protocols without pairing. We then propose a novel grid pairing-free certificate-less
two-party authenticated key agreement (GPC-AKA) protocol, providing a more lightweight key
management approach for grid users. We also show, a GPC-AKA security protocol proof using formal
automated security analysis Sycther tool.
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...IJERA Editor
This paper presents a new algorithm on waveletbased robust and invisible digital image watermarking for multimedia security. The proposed algorithm has been designed, implemented and verified using MATLAB R2014a simulation for both embedding and extraction of the watermark and the results of which shows significant improvement in performance metrics like PSNR, SSIM, Mean Correlation, MSE than the other existing algorithms in the current literature. The cover image considered here in our algorithm is of the size (256x256) and the binary watermark image size is taken as (16x16).
What is SMC. SMC Models. Type of Adversaries. Applications. Goals. Actions. Types of Operations. Randomization Techniques. Oblivious Transfer. Cryptographic Techniques
A Proxy signature scheme enables a proxy signer to sign a message on behalf of
the original signer. In this paper, we propose ECDLP based solution for chen et. al [1]
scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the
proxy requirements and require only elliptic curve multiplication and elliptic curve addition
which needs less computation overhead compared to modular exponentiations also our
scheme is withstand against original signer forgery and public key substitution attack.
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
The predominant grid authentication mechanisms use public key infrastructure (PKI). Nonetheless,
certificate-less public key cryptography (CL-PKC) has several advantages that seem to well align with the
demands of grid computing. Security and efficiency are the main objectives of grid authentication
protocols. Unfortunately, certificate-less authenticated key agreement protocols rely on the bilinear
pairing, that is extremely computational expensive. In this paper, we analyze the recently secure certificateless
key agreement protocols without pairing. We then propose a novel grid pairing-free certificate-less
two-party authenticated key agreement (GPC-AKA) protocol, providing a more lightweight key
management approach for grid users. We also show, a GPC-AKA security protocol proof using formal
automated security analysis Sycther tool.
Elliptic Curve based Authenticated Session Key Establishment Protocol for Hig...IJNSA Journal
The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...IJERA Editor
This paper presents a new algorithm on waveletbased robust and invisible digital image watermarking for multimedia security. The proposed algorithm has been designed, implemented and verified using MATLAB R2014a simulation for both embedding and extraction of the watermark and the results of which shows significant improvement in performance metrics like PSNR, SSIM, Mean Correlation, MSE than the other existing algorithms in the current literature. The cover image considered here in our algorithm is of the size (256x256) and the binary watermark image size is taken as (16x16).
What is SMC. SMC Models. Type of Adversaries. Applications. Goals. Actions. Types of Operations. Randomization Techniques. Oblivious Transfer. Cryptographic Techniques
A Proxy signature scheme enables a proxy signer to sign a message on behalf of
the original signer. In this paper, we propose ECDLP based solution for chen et. al [1]
scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the
proxy requirements and require only elliptic curve multiplication and elliptic curve addition
which needs less computation overhead compared to modular exponentiations also our
scheme is withstand against original signer forgery and public key substitution attack.
Automated Contract Compliance using RAG based LLM solution-AbstractJyotishko Biswas
(Please note: This is abstract only, paper submitted to IEEE publication)
- Paper on Generative AI powered application to solve chronic business problem for Fortune 500 firms.
- Large firms has million+ pages of supplier contracts which are impossible to audit. It results in non-compliance driving losses of billion+ dollars.
- Our Gen AI application identifying contracts which are non compliant in few minutes only!
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...Osama M. Khaled
Pervasive computing systems are complex and challenging. In this research, our aim is to build a robust reference architecture for pervasive computing derived from real business needs and based on process re-engineering practices. We derived requirements from different sources grouped by selected quality features and worked on refining them by identifying the conflicts among these requirements, and by introducing solutions for them. We checked the consistency of these solutions across all the requirements. We built a mathematical model that describes the degrees of consistency with the requirements model and showed that they are normally distributed within that scope.
Full paper:
https://www.researchgate.net/publication/316582796_A_Statistical_Approach_to_Resolve_Conflicting_Requirements_in_Pervasive_Computing_Systems?_iepl%5BviewId%5D=GYzOmb1HA01ScDf1IJ1T8eif&_iepl%5BprofilePublicationItemVariant%5D=default&_iepl%5Bcontexts%5D%5B0%5D=prfpi&_iepl%5BtargetEntityId%5D=PB%3A316582796&_iepl%5BinteractionType%5D=publicationTitle
Citation
Osama M. Khaled, Hoda M. Hosny, Mohamed Shalan (2017). A Statistical Approach to resolve conflicting requirements in pervasive computing systems. The 12th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2017), Porto, Portugal, 28-29 April 2017.
Contract Management Solutions — Spend less time on Contracts.pdfStewardFaris
Contracts are an integral part of any business, serving as the foundation for agreements, partnerships, and transactions. However, managing contracts efficiently can be a time-consuming and complex task. Fortunately, contract management solutions have emerged to streamline this process, allowing businesses to spend less time on contracts and more time on strategic initiatives. In this article, we will explore the benefits of contract management solutions and how they can revolutionise your business operations.
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.
License DSL translation in COMPAS frameworkCuddle.ai
This presentation was presented in Virtual goods conference 2010 against the paper submitted by the authors. In the paper author presented a case study in the framework of COMPAS(http://www.compas-ict.eu/), a research project focused on supporting compliance monitoring and verification in service based systems. In the paper, authors also illustrated how we translate high-level service licenses (specified in Open Digital Rights Language for Services (ODRL-S)) to low-level rules for verifying the compliance requirements at runtime. Authors have validated their approach by architecting a compliance driven service oriented system, where at runtime business processes are monitored for compliance.
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.
webbased contract management system with build in e-sign engine. SaaS and licence model. Close legal binding contracts over the internet. A recent browser is all you need to start managing your contracts. More info at http://www.DocStation.be
DocStation is a webbased contract management system with build in e-sign engine. contract compliance, contract management, contract generation, standardisation and contract execution. Check the website http://www.docstation.be Starts at 200 euro / month for unlimited users and 100 MB webspace
What Is A Smart Contract Audit?
A Comprehensive Guide - Did you know that the global smart contracts market size is estimated to reach USD 770.52 million by 2028 from USD 144.95 million in 2020?... To know in detail you can get in touch with Blocktech Brew, a Smart Contract Development Company. Adopt an Automated and Transparent Way of Executing Your Business Processes.
Determining the trustworthiness of unfamiliar electronic contractsPaul Groth
Expressing contractual agreements electronically potentially allows
agents to automatically perform functions surrounding contract use: establish-
ment, fulfilment, renegotiation etc. For such automation to be used for real busi-
ness concerns, there needs to be a high level of trust in the agent-based system.
While there has been much research on simulating trust between agents, there
are areas where such trust is harder to establish. In particular, contract proposals
may come from parties that an agent has had no prior interaction with and, in
competitive business-to-business environments, little reputation information may
be available. In human practice, trust in a proposed contract is determined in part
from the content of the proposal itself, and the similarity of the content to that of
prior contracts, executed to varying degrees of success. In this paper, we argue
that such analysis is also appropriate in automated systems, and to provide it we
need systems to record salient details of prior contract use and algorithms for as-
sessing proposals on their content. We use provenance technology to provide the
former and detail algorithms for measuring contract success and similarity for the
latter, applying them to an aerospace case study.
How AI is Making Contract Management Easier and More EffectiveSirionLabs
While the number of enterprises implementing Contract Lifecycle Management solutions is increasing rapidly, there are still major concerns related to user adoption, business impact and Return on Investment. This is due to a combination of factors – user experience is complex, automation is superficial requiring additional manual effort, limited analytics, lack of functional depth to drive business outcomes, etc.
The good news is that with Artificial Intelligence (AI) driving the next generation of CLMs, enterprises are successfully overcoming the above barriers to realize true business transformation. Watch this webinar featuring Andrew Bartels, VP and Principal Analyst, Forrester and Ajay Agrawal, Founder and Chairman, SirionLabs to discover how AI is enabling improved business velocity, risk mitigation, and financial and business outcomes in commercial engagements.
For more information, visit https://www.sirionlabs.com/
Service Architectures in H.323 and SIP – A Comparison Long Nguyen
Chuyên cung cấp dịch vụ và giải pháp VOIP, 1800,1900
TIME TRUE LIFE TECHNOLOGY JOINT STOCK COMPANY
Mr Long
Mobi: 0986883886 - 0905710588
Email: long.npb@ttlcorp.vn
Website: ttlcorp.vn / http://timetruelife.blogspot.com/
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...nexgentechnology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Automated Contract Compliance using RAG based LLM solution-AbstractJyotishko Biswas
(Please note: This is abstract only, paper submitted to IEEE publication)
- Paper on Generative AI powered application to solve chronic business problem for Fortune 500 firms.
- Large firms has million+ pages of supplier contracts which are impossible to audit. It results in non-compliance driving losses of billion+ dollars.
- Our Gen AI application identifying contracts which are non compliant in few minutes only!
A Statistical Approach to Resolve Conflicting Requirements in Pervasive Compu...Osama M. Khaled
Pervasive computing systems are complex and challenging. In this research, our aim is to build a robust reference architecture for pervasive computing derived from real business needs and based on process re-engineering practices. We derived requirements from different sources grouped by selected quality features and worked on refining them by identifying the conflicts among these requirements, and by introducing solutions for them. We checked the consistency of these solutions across all the requirements. We built a mathematical model that describes the degrees of consistency with the requirements model and showed that they are normally distributed within that scope.
Full paper:
https://www.researchgate.net/publication/316582796_A_Statistical_Approach_to_Resolve_Conflicting_Requirements_in_Pervasive_Computing_Systems?_iepl%5BviewId%5D=GYzOmb1HA01ScDf1IJ1T8eif&_iepl%5BprofilePublicationItemVariant%5D=default&_iepl%5Bcontexts%5D%5B0%5D=prfpi&_iepl%5BtargetEntityId%5D=PB%3A316582796&_iepl%5BinteractionType%5D=publicationTitle
Citation
Osama M. Khaled, Hoda M. Hosny, Mohamed Shalan (2017). A Statistical Approach to resolve conflicting requirements in pervasive computing systems. The 12th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE 2017), Porto, Portugal, 28-29 April 2017.
Contract Management Solutions — Spend less time on Contracts.pdfStewardFaris
Contracts are an integral part of any business, serving as the foundation for agreements, partnerships, and transactions. However, managing contracts efficiently can be a time-consuming and complex task. Fortunately, contract management solutions have emerged to streamline this process, allowing businesses to spend less time on contracts and more time on strategic initiatives. In this article, we will explore the benefits of contract management solutions and how they can revolutionise your business operations.
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.
License DSL translation in COMPAS frameworkCuddle.ai
This presentation was presented in Virtual goods conference 2010 against the paper submitted by the authors. In the paper author presented a case study in the framework of COMPAS(http://www.compas-ict.eu/), a research project focused on supporting compliance monitoring and verification in service based systems. In the paper, authors also illustrated how we translate high-level service licenses (specified in Open Digital Rights Language for Services (ODRL-S)) to low-level rules for verifying the compliance requirements at runtime. Authors have validated their approach by architecting a compliance driven service oriented system, where at runtime business processes are monitored for compliance.
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.
webbased contract management system with build in e-sign engine. SaaS and licence model. Close legal binding contracts over the internet. A recent browser is all you need to start managing your contracts. More info at http://www.DocStation.be
DocStation is a webbased contract management system with build in e-sign engine. contract compliance, contract management, contract generation, standardisation and contract execution. Check the website http://www.docstation.be Starts at 200 euro / month for unlimited users and 100 MB webspace
What Is A Smart Contract Audit?
A Comprehensive Guide - Did you know that the global smart contracts market size is estimated to reach USD 770.52 million by 2028 from USD 144.95 million in 2020?... To know in detail you can get in touch with Blocktech Brew, a Smart Contract Development Company. Adopt an Automated and Transparent Way of Executing Your Business Processes.
Determining the trustworthiness of unfamiliar electronic contractsPaul Groth
Expressing contractual agreements electronically potentially allows
agents to automatically perform functions surrounding contract use: establish-
ment, fulfilment, renegotiation etc. For such automation to be used for real busi-
ness concerns, there needs to be a high level of trust in the agent-based system.
While there has been much research on simulating trust between agents, there
are areas where such trust is harder to establish. In particular, contract proposals
may come from parties that an agent has had no prior interaction with and, in
competitive business-to-business environments, little reputation information may
be available. In human practice, trust in a proposed contract is determined in part
from the content of the proposal itself, and the similarity of the content to that of
prior contracts, executed to varying degrees of success. In this paper, we argue
that such analysis is also appropriate in automated systems, and to provide it we
need systems to record salient details of prior contract use and algorithms for as-
sessing proposals on their content. We use provenance technology to provide the
former and detail algorithms for measuring contract success and similarity for the
latter, applying them to an aerospace case study.
How AI is Making Contract Management Easier and More EffectiveSirionLabs
While the number of enterprises implementing Contract Lifecycle Management solutions is increasing rapidly, there are still major concerns related to user adoption, business impact and Return on Investment. This is due to a combination of factors – user experience is complex, automation is superficial requiring additional manual effort, limited analytics, lack of functional depth to drive business outcomes, etc.
The good news is that with Artificial Intelligence (AI) driving the next generation of CLMs, enterprises are successfully overcoming the above barriers to realize true business transformation. Watch this webinar featuring Andrew Bartels, VP and Principal Analyst, Forrester and Ajay Agrawal, Founder and Chairman, SirionLabs to discover how AI is enabling improved business velocity, risk mitigation, and financial and business outcomes in commercial engagements.
For more information, visit https://www.sirionlabs.com/
Service Architectures in H.323 and SIP – A Comparison Long Nguyen
Chuyên cung cấp dịch vụ và giải pháp VOIP, 1800,1900
TIME TRUE LIFE TECHNOLOGY JOINT STOCK COMPANY
Mr Long
Mobi: 0986883886 - 0905710588
Email: long.npb@ttlcorp.vn
Website: ttlcorp.vn / http://timetruelife.blogspot.com/
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COLLUSION-TOLERABLE PRIVACY-PRESERVING SUM AND PRODUCT CALCULATION WITHOUT SE...nexgentechnology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Toxic effects of heavy metals : Lead and Arsenicsanjana502982
Heavy metals are naturally occuring metallic chemical elements that have relatively high density, and are toxic at even low concentrations. All toxic metals are termed as heavy metals irrespective of their atomic mass and density, eg. arsenic, lead, mercury, cadmium, thallium, chromium, etc.
DERIVATION OF MODIFIED BERNOULLI EQUATION WITH VISCOUS EFFECTS AND TERMINAL V...Wasswaderrick3
In this book, we use conservation of energy techniques on a fluid element to derive the Modified Bernoulli equation of flow with viscous or friction effects. We derive the general equation of flow/ velocity and then from this we derive the Pouiselle flow equation, the transition flow equation and the turbulent flow equation. In the situations where there are no viscous effects , the equation reduces to the Bernoulli equation. From experimental results, we are able to include other terms in the Bernoulli equation. We also look at cases where pressure gradients exist. We use the Modified Bernoulli equation to derive equations of flow rate for pipes of different cross sectional areas connected together. We also extend our techniques of energy conservation to a sphere falling in a viscous medium under the effect of gravity. We demonstrate Stokes equation of terminal velocity and turbulent flow equation. We look at a way of calculating the time taken for a body to fall in a viscous medium. We also look at the general equation of terminal velocity.
Phenomics assisted breeding in crop improvementIshaGoswami9
As the population is increasing and will reach about 9 billion upto 2050. Also due to climate change, it is difficult to meet the food requirement of such a large population. Facing the challenges presented by resource shortages, climate
change, and increasing global population, crop yield and quality need to be improved in a sustainable way over the coming decades. Genetic improvement by breeding is the best way to increase crop productivity. With the rapid progression of functional
genomics, an increasing number of crop genomes have been sequenced and dozens of genes influencing key agronomic traits have been identified. However, current genome sequence information has not been adequately exploited for understanding
the complex characteristics of multiple gene, owing to a lack of crop phenotypic data. Efficient, automatic, and accurate technologies and platforms that can capture phenotypic data that can
be linked to genomics information for crop improvement at all growth stages have become as important as genotyping. Thus,
high-throughput phenotyping has become the major bottleneck restricting crop breeding. Plant phenomics has been defined as the high-throughput, accurate acquisition and analysis of multi-dimensional phenotypes
during crop growing stages at the organism level, including the cell, tissue, organ, individual plant, plot, and field levels. With the rapid development of novel sensors, imaging technology,
and analysis methods, numerous infrastructure platforms have been developed for phenotyping.
Seminar of U.V. Spectroscopy by SAMIR PANDASAMIR PANDA
Spectroscopy is a branch of science dealing the study of interaction of electromagnetic radiation with matter.
Ultraviolet-visible spectroscopy refers to absorption spectroscopy or reflect spectroscopy in the UV-VIS spectral region.
Ultraviolet-visible spectroscopy is an analytical method that can measure the amount of light received by the analyte.
Observation of Io’s Resurfacing via Plume Deposition Using Ground-based Adapt...Sérgio Sacani
Since volcanic activity was first discovered on Io from Voyager images in 1979, changes
on Io’s surface have been monitored from both spacecraft and ground-based telescopes.
Here, we present the highest spatial resolution images of Io ever obtained from a groundbased telescope. These images, acquired by the SHARK-VIS instrument on the Large
Binocular Telescope, show evidence of a major resurfacing event on Io’s trailing hemisphere. When compared to the most recent spacecraft images, the SHARK-VIS images
show that a plume deposit from a powerful eruption at Pillan Patera has covered part
of the long-lived Pele plume deposit. Although this type of resurfacing event may be common on Io, few have been detected due to the rarity of spacecraft visits and the previously low spatial resolution available from Earth-based telescopes. The SHARK-VIS instrument ushers in a new era of high resolution imaging of Io’s surface using adaptive
optics at visible wavelengths.
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
Specification and Verification of Contract-based Applications
1. Specication and Verication
of Contract-Based Applications
Ph.D. candidate: Davide Basile
Supervisors: Pierpaolo Degano Gian-Luigi Ferrari
Department of Computer Science, University of Pisa
21/06/2016
2. Overline of the presentation
1 Research eld, Challenges, Goal of the thesis
2 PhD thesis contributions Questions
3 Conclusions
3. Introduction: SOC paradigm, Motivations, Challenges
ICT infrastructures depend on heterogeneous inter-organizational
digital systems that cooperate through the Internet;
Service Oriented Computing: a recent paradigm for building
applications by composing loosely coupled, ne grained distributed
computational units called services. Services are provided by mutually
distrusted organizations, and have to compete to reach their goals;
Challenges: Provide new methodologies for designing distributed
systems and verifying that their composite behaviour agree to
specied safety requirements, even in a malicious environment;
Formal models play an important role in providing models and tools
for these purposes.
4. Introduction: Contracts
Goal of the thesis
The goal of the thesis is to provide techniques for specifying and verifying
properties of service-based distributed systems
Service contracts have been introduced to:
1 describe the behaviour of services: requirements and obligations;
2 characterize service assemblies;
3 guarantee safety properties: behavioural conformance, agreement;
5. Introduction: Contracts, SOA
Service contracts: published in a trusted repository, accessed through
service discovery;
Coordinator: nds and proposes an agreement to the interacting
parties, all the requirements and duties are satised;
Eventually if any involved service violates its contract agreement, it
will be blamed.
6. Service Coordination: Orchestration and Choreography
Orchestration
Services interact via mediation of a distinguished participants, the
orchestrator, that regulates the control ow.
Choreography
Distributed participants interact autonomously, by conforming to a given
global description.
7. PhD thesis contributions
1 Contract Compliance as a Safety Property
multi-party contracts, ecient model checking techniques
2 Contract Automata: a novel automata-based model of contracts
compositional, several notions of agreement, liable principals, Control
Theory and Linear Programming techniques
3 Contract Automata have been related to
Two Intuitionistic Logics for Contracts
logical characterization of contract agreement
an Automata-based Choreographic Model for SOC
decentralization, reducing the communication overhead
4 A Tool for Contract Automata
fully automatize our proposal
8. Publications
International Journals:
1 Basile, D., Degano, P., Ferrari, G.L.: A formal framework for secure and complying services. The
Journal of Supercomputing 69(1), 4352 (2014);
2 Basile D. , Degano P. , Ferrari G.L. , Tuosto E.: Relating two automata-based models of
orchestration and choreography, Journal of Logical and Algebraic Methods in Programming, Volume
85, Issue 3, April 2016, Pages 425-446, ISSN 2352-2208;
3 Basile, D., Degano, P., Ferrari, G.L.: Automata for specifying and orchestrating service contracts. To
appear in Journal of Logical Methods in Computer Science (2016), ISSN: 1860-5974;
International Conferences and Workshops:
1 Basile, D.: Service interaction contracts as security policies. In: ICTCS 2012, Varese, Italy, available
online at http://ictcs.di.unimi.it/papers/paper_28.pdf;
2 Basile, D., Degano, P., Ferrari, G.L.: Secure and unfailing services. In: Malyshkin, V. (ed.) PaCT.
LNCS, vol. 7979, pp. 167181. Springer (2013);
3 Basile, D., Degano, P., Ferrari, G.L.: Automata for service contracts. In: Hot Issues in Security
Principles and Trust - 2nd Workshop, HOTSPOT 2014, Grenoble, France;
4 Basile, D., Degano, P., Ferrari, G.L.: Automata for analysing service contracts. In: Trustworthy
Global Computing - 9th International Symposium, TGC 2014. Revised Selected Papers, LNCS, vol.
8902, pp. 3450. Springer (2014);
5 Basile, D., Degano, P., Ferrari, G.L., Tuosto, E.: From orchestration to choreography through
contract automata. In: Lanese, I., Lluch-Lafuente, A., Sokolova, A., Vieira, H.T. (eds.) Proceedings
7th Interaction and Concurrency Experience 2014, Berlin, Germany. EPTCS, vol. 166,;
6 Basile, D., Degano, P., Ferrari, G.L., Tuosto, E.: Playing with our CAT and Communication-Centric
Applications. To appear in Formal Techniques for Networked and Distributed Systems (FORTE)
2016, LNCS, volume 9688, 2016.
9. Contract Compliance as a Safety Property
Section 1
Contract Compliance as a Safety Property
10. Contract Compliance as a Safety Property
Compliance as a Safety Property: Contributions
a SOC formal model combining:
Contracts σ: Server-Client interactions
Security ϕ: Resource Access Control
Novelties
naturally deals with σ, ϕ and multi-party
model checking techniques for ensuring compliance of σ and ϕ
compliance=safety property
11. Contract Compliance as a Safety Property
Behavioural contracts
A CCS-like process algebra characterising bi-party interactions:
prex a.σ perform an I/O action a and then σ
internal choice σ1 ⊕ σ2 internally decide the branch
external choice σ1 + σ2 the other party decides the branch
Compliance
σ ρ : the client σ successfully terminates all its interactions with the
server ρ
Example
a ⊕ b a + b + c a ⊕ b ⊕ c a + b
12. Contract Compliance as a Safety Property
Behavioural contracts
A CCS-like process algebra characterising bi-party interactions:
prex a.σ perform an I/O action a and then σ
internal choice σ1 ⊕ σ2 internally decide the branch
external choice σ1 + σ2 the other party decides the branch
Compliance
σ ρ : the client σ successfully terminates all its interactions with the
server ρ
Example
a ⊕ b a + b + c a ⊕ b ⊕ c a + b
13. Contract Compliance as a Safety Property
Behavioural contracts
A CCS-like process algebra characterising bi-party interactions:
prex a.σ perform an I/O action a and then σ
internal choice σ1 ⊕ σ2 internally decide the branch
external choice σ1 + σ2 the other party decides the branch
Compliance
σ ρ : the client σ successfully terminates all its interactions with the
server ρ
Example
a ⊕ b a + b + c a ⊕ b ⊕ c a + b
14. Contract Compliance as a Safety Property
History Expression, Security Policies
Access events α security critical operations logged into history η
History Expressions: abstract descriptions of services α
Security policies ϕ: regular properties of η,
Orchestrator: binds requests to services satisfying ϕ
Model-Checking techniques: H π
R ∩ ϕ
Example
ϕ : never perform αwrite after αread
η = αread ϕαwrite ϕ η |=
15. Contract Compliance as a Safety Property
History Expression, Security Policies
Access events α security critical operations logged into history η
History Expressions: abstract descriptions of services α
Security policies ϕ: regular properties of η,
Orchestrator: binds requests to services satisfying ϕ
Model-Checking techniques: H π
R ∩ ϕ
Example
ϕ : never perform αwrite after αread
η = αread ϕαwrite ϕ η |=
16. Contract Compliance as a Safety Property
The proposed calculus
the proposed calculus = H + σ + multi-party session primitives
Theorem (Compliance)
Let (H1)!
= H1 and (H2)!
= H2
H1 H2 if and only if L (H1 ⊗ H2) = ∅
(H1)!
extract from a service description all σ and H, to check them
separately (modularity);
synchronous product of a client and a server contracts: nal states represent
violation of compliance.
17. Contract Compliance as a Safety Property
The proposed calculus
the proposed calculus = H + σ + multi-party session primitives
Theorem (Compliance)
Let (H1)!
= H1 and (H2)!
= H2
H1 H2 if and only if L (H1 ⊗ H2) = ∅
(H1)!
extract from a service description all σ and H, to check them
separately (modularity);
synchronous product of a client and a server contracts: nal states represent
violation of compliance.
18. Contract Compliance as a Safety Property
Question
Question
What we gain by incorporating σ and ϕ?
Compliance of behavioural contracts is a safety property, and can be
eciently veried through automata-based model checking techniques;
A calculus with primitives for multi-party contract interactions;
Security properties over behavioural contracts.
20. Contract Automata
Contract Automata for SOC
An original automata-based model called contract automata:
Compositional, describes both principals and composite services,
Automata compositions: ⊗, ,
Safety checks: A; Z, W - agreement; strong and weak agreement,
Synthesise the orchestrator via Control Theory, when possible,
otherwise Linear programming techniques;
Detect liable principals,
Decentralization: remove the orchestrator,
21. Contract Automata
Contract Automata (CA)
Contract Automata: FSA enhanced with:
Partitioned alphabet:
Ar
request actions
Ao
oer actions
rank the number of principals in the contract
principal rank=1 and Ar
∩ co(Ao
) = ∅
the labels are vectors of three types:
request: ( , a, , )
oer: ( , , , a)
match: ( , a, , a)
25. Contract Automata
Product Example: B1 ⊗ Bad_B2 2
qB10
qB11
qB12
qB13
price quote1 contrib qB20
qB21
contrib
Then remove interleavings and add a match where it is possible
q0 q1 q2
q4 q5 q6
q3
q7
(price, )
( , contrib)
(quote1, )
( , contrib)
(contrib, )
( , contrib)
(contrib, contrib)
( , contrib)
(contrib, )(price, ) (quote1, )
Figure: B1 ⊗ Bad_B2
26. Contract Automata
Product Example:(B1 ⊗ Bad_B2) ⊗ Bad_B2
The product ⊗ models a static orchestration policy: matches are not
rearranged, Bad_B2
never receives contrib
q1
qi0
qi2
qi1
qi3
( , , contrib)
(contrib, contrib, )
( , , contrib)
(contrib, contrib, )
Figure: (B1 ⊗ Bad_B2) ⊗ Bad_B2
27. Contract Automata
Product Example:(B1 Bad_B2) Bad_B2
The a-product models a dynamic orchestration policy: matches are
rearranged, Bad_B2
could receive contrib
q
qi0
qi2
qi1
qi3
(contrib, , contrib)
(contrib, contrib, )
( , , contrib)
( , contrib, )
Figure: (B1 Bad_B2) Bad_B2
= Π; ⊗ (Π recovers principals from a CA)
28. Contract Automata
Three properties of agreement
Z Strong Agreement : all requests and oers matched synchronously;
A Agreement: all requests matched synchronously, free oers
(environment);
W Weak Agreement: all requests matched asynchronously (debits).
A admits P ↔ L (A) ∩ P = ∅, P ∈ {Z, A, W}
A is P safe ↔ L (A) ⊆ P
if A admits P but it is not P safe, then someone is liable,
i.e. good executions exist together with bad computations Question
Control Theory ⇒ regular properties
Mixed Integer Linear Programming ⇒ context-sensitive property
29. Contract Automata
Three properties of agreement
Z Strong Agreement : all requests and oers matched synchronously;
A Agreement: all requests matched synchronously, free oers
(environment);
W Weak Agreement: all requests matched asynchronously (debits).
A admits P ↔ L (A) ∩ P = ∅, P ∈ {Z, A, W}
A is P safe ↔ L (A) ⊆ P
if A admits P but it is not P safe, then someone is liable,
i.e. good executions exist together with bad computations Question
Control Theory ⇒ regular properties
Mixed Integer Linear Programming ⇒ context-sensitive property
30. Contract Automata
Three properties of agreement
Z Strong Agreement : all requests and oers matched synchronously;
A Agreement: all requests matched synchronously, free oers
(environment);
W Weak Agreement: all requests matched asynchronously (debits).
A admits P ↔ L (A) ∩ P = ∅, P ∈ {Z, A, W}
A is P safe ↔ L (A) ⊆ P
if A admits P but it is not P safe, then someone is liable,
i.e. good executions exist together with bad computations Question
Control Theory ⇒ regular properties
Mixed Integer Linear Programming ⇒ context-sensitive property
31. Contract Automata
Strong Agreement, Agreement, Weak Agreement
Strong Agreement Z
(a, a)(b, b) ∈ Z
(a, a)(b, b)(c, ) ∈ Z
Agreement A
(a, a)(b, b)(c, ) ∈ A
(a, )(b, b)( , a)(c, ) ∈ A
Weak Agreement W
(a, )(b, b)( , a)(c, ) ∈ W
(a, )(a, )(b, b)( , a)(c, ) ∈ W
32. Contract Automata
Strong Agreement, Agreement, Weak Agreement
Strong Agreement Z
(a, a)(b, b) ∈ Z
(a, a)(b, b)(c, ) ∈ Z
Agreement A
(a, a)(b, b)(c, ) ∈ A
(a, )(b, b)( , a)(c, ) ∈ A
Weak Agreement W
(a, )(b, b)( , a)(c, ) ∈ W
(a, )(a, )(b, b)( , a)(c, ) ∈ W
33. Contract Automata
Strong Agreement, Agreement, Weak Agreement
Strong Agreement Z
(a, a)(b, b) ∈ Z
(a, a)(b, b)(c, ) ∈ Z
Agreement A
(a, a)(b, b)(c, ) ∈ A
(a, )(b, b)( , a)(c, ) ∈ A
Weak Agreement W
(a, )(b, b)( , a)(c, ) ∈ W
(a, )(a, )(b, b)( , a)(c, ) ∈ W
34. Contract Automata
Synthesising the orchestrator
Orchestrator = Most Permissive Controller (MPC), Control Theory;
all actions controllable: the MPC exists;
predicates to be enforced: properties of agreement (Z, A);
liable transitions: those denitively compromising the agreement, i.e.
source state ∈ MPC, target state ∈ MPC;
The orchestrator only allows good behaviour while blocking bad
ones.
44. Contract Automata
Weak-Agreement
We consider a dierent type of agreement, where actions are taken on
credit if in the future the obligations will be honoured.
Addressed in literature with formalisms as logic, event structures, petri
nets, process algebra etc..
Example
Alice and Bob do not trust each other
Alice = toy.bike, Bob = bike.toy
Alice ⊗Bob = (toy, )(bike, bike)( , toy)+( , bike)(toy, toy)(bike, )
L (Alice ⊗ Bob) ∩ A = ∅ L (Alice ⊗ Bob) ∩ W = ∅
45. Contract Automata
Weak agreement example
qB10
qB11
qB12
qB13
price
quote1
contrib
Buyer B1
qB20
qB21
qB22
qB23
qB24
contrib quote2
ok
nop
delivery
Buyer NotSoBad_B2
qS 0
qS 1
qS 2
qS 3
qS 4
qS 5
price
quote2
quote1
ok
nop delivery
Seller S
L (KB1⊗NotSoBadB2⊗S) = ∅ w ∈ W ∩ L (B1 ⊗ NotSoBadB2 ⊗ S)
detected circular dependency
w = (price, , price)( , contrib, )( , quote2, quote2)
( , quote1, quote1)(contrib, , )( , nop, nop)
46. Contract Automata
Weak agreement example
qB10
qB11
qB12
qB13
price
quote1
contrib
Buyer B1
qB20
qB21
qB22
qB23
qB24
contrib quote2
ok
nop
delivery
Buyer NotSoBad_B2
qS 0
qS 1
qS 2
qS 3
qS 4
qS 5
price
quote2
quote1
ok
nop delivery
Seller S
L (KB1⊗NotSoBadB2⊗S) = ∅ w ∈ W ∩ L (B1 ⊗ NotSoBadB2 ⊗ S)
detected circular dependency
w = (price, , price)( , contrib, )( , quote2, quote2)
( , quote1, quote1)(contrib, , )( , nop, nop)
47. Contract Automata
Weak agreement example
qB10
qB11
qB12
qB13
price
quote1
contrib
Buyer B1
qB20
qB21
qB22
qB23
qB24
contrib quote2
ok
nop
delivery
Buyer NotSoBad_B2
qS 0
qS 1
qS 2
qS 3
qS 4
qS 5
price
quote2
quote1
ok
nop delivery
Seller S
L (KB1⊗NotSoBadB2⊗S) = ∅ w ∈ W ∩ L (B1 ⊗ NotSoBadB2 ⊗ S)
detected circular dependency
w = (price, , price)( , contrib, )( , quote2, quote2)
( , quote1, quote1)(contrib, , )( , nop, nop)
48. Contract Automata
Checking Weak Safety and Weak Agreement
Theorem
W is a context-sensitive property, but not context-free.
Not decidable in general, W is decidable
novel technique based on network ow problems to check W
optimization techniques can be exploited to verify properties of service
composition.
Automata ⇒ Networks
Traces ⇒ Flows
Labels ⇒ Weights (Oers +1, Requests -1)
P holds ⇒ objective function 0
49. Contract Automata
Checking Weak Safety and Weak Agreement
Theorem
W is a context-sensitive property, but not context-free.
Not decidable in general, W is decidable
novel technique based on network ow problems to check W
optimization techniques can be exploited to verify properties of service
composition.
Automata ⇒ Networks
Traces ⇒ Flows
Labels ⇒ Weights (Oers +1, Requests -1)
P holds ⇒ objective function 0
50. Contract Automata
Weak Safety
the objective function min γ selects the trace and action with
minimum n = |O| − |R|.
min γ ≥ 0 i A is weakly safe
Theorem
Let v be a binary vector. Then a CA A is weakly safe i min γ ≥ 0 where:
i∈Il
vi
tj ∈T
ai
tj
xtj ≤ γ
i∈Il
vi = 1 ∀i ∈ Il .vi ∈ {0, 1}
(xt1 . . . xtn ) ∈ Fx γ ∈ R
51. Contract Automata
Weak Safety
the objective function min γ selects the trace and action with
minimum n = |O| − |R|.
min γ ≥ 0 i A is weakly safe
Theorem
Let v be a binary vector. Then a CA A is weakly safe i min γ ≥ 0 where:
i∈Il
vi
tj ∈T
ai
tj
xtj ≤ γ
i∈Il
vi = 1 ∀i ∈ Il .vi ∈ {0, 1}
(xt1 . . . xtn ) ∈ Fx γ ∈ R
52. Contract Automata
Weak Agreement
the objective function max γ selects the trace and action with
maximum n = |O| − |R|.
max γ 0 i A does not admit W
Theorem
The CA A admits weak agreement i :
max γ ≥ 0 and ∀i ∈ Il .
tj ∈T
ai
tj
xtj ≥ γ
(xt1 . . . xtn ) ∈ Fx γ ∈ R
53. Contract Automata
Weak Agreement
the objective function max γ selects the trace and action with
maximum n = |O| − |R|.
max γ 0 i A does not admit W
Theorem
The CA A admits weak agreement i :
max γ ≥ 0 and ∀i ∈ Il .
tj ∈T
ai
tj
xtj ≥ γ
(xt1 . . . xtn ) ∈ Fx γ ∈ R
54. Contract Automata
Weak Liability
q0start qs
qd
qf
x y
t u
the bilevel problem checks if ∃ (min) x · y ∈ W such that ∀ (max) u
we have x · t · u ∈ W
Theorem
The participant Πi (A) of a CA A is weakly liable if and only if there exists
a transition t = (qs, a, qt), ai = , and γt 0, where
γt = min {f (x) | x ∈ Fq0,qs
, y ∈ Fqs ,qf
, ∀i ∈ Il . tj ∈T ai
tj
(xtj + ytj ) ≥ 0}
f (x) = max {γ | u ∈ Fqt ,qf
∀i ∈ Il . tj ∈T ai
tj
(xtj + utj ) + ai
t
≥ γ, γ ∈ R}
55. Contract Automata
Weak Liability
q0start qs
qd
qf
x y
t u
the bilevel problem checks if ∃ (min) x · y ∈ W such that ∀ (max) u
we have x · t · u ∈ W
Theorem
The participant Πi (A) of a CA A is weakly liable if and only if there exists
a transition t = (qs, a, qt), ai = , and γt 0, where
γt = min {f (x) | x ∈ Fq0,qs
, y ∈ Fqs ,qf
, ∀i ∈ Il . tj ∈T ai
tj
(xtj + ytj ) ≥ 0}
f (x) = max {γ | u ∈ Fqt ,qf
∀i ∈ Il . tj ∈T ai
tj
(xtj + utj ) + ai
t
≥ γ, γ ∈ R}
56. Contract Automata
Properties of composition under agreement
Competitive Ao
1
∩ Ao
2
∩ co(Ar
1
∪ Ar
2
) = ∅
Collaborative (Ao
1
∩ co(Ar
2
)) ∪ (co(Ar
1
) ∩ Ao
2
) = ∅
Theorem (Competitive, Collaborative and Agreement)
A1, A2 safe ⇒ A1 ⊗ A2 is safe but A1 A2 no.
A1, A2 safe and non-competitive ⇒ A1 A2 is safe.
Modular verication: eciency
57. Contract Automata
Properties of composition under agreement
Competitive Ao
1
∩ Ao
2
∩ co(Ar
1
∪ Ar
2
) = ∅
Collaborative (Ao
1
∩ co(Ar
2
)) ∪ (co(Ar
1
) ∩ Ao
2
) = ∅
Theorem (Competitive, Collaborative and Agreement)
A1, A2 safe ⇒ A1 ⊗ A2 is safe but A1 A2 no.
A1, A2 safe and non-competitive ⇒ A1 A2 is safe.
Modular verication: eciency
59. Relating Contract Automata and Choreographies
Decentralization
Orchestrator KSA
−
⇒ System of CFSMs Choreography
synchronous CFSMs one-buer
convergence ⇒ branching condition
asynchronous CFSMs unbounded-buers
convergence ⇒ no mixed choices
branching condition = indipendent moves
no mixed choices = single point of choice
Intended benets: dismissing the orchestrator, so reducing the
communication overhead.
60. Relating Contract Automata and Choreographies
Decentralization
Orchestrator KSA
−
⇒ System of CFSMs Choreography
synchronous CFSMs one-buer
convergence ⇒ branching condition
asynchronous CFSMs unbounded-buers
convergence ⇒ no mixed choices
branching condition = indipendent moves
no mixed choices = single point of choice
Intended benets: dismissing the orchestrator, so reducing the
communication overhead.
61. Relating Contract Automata and Choreographies
Decentralization
Orchestrator KSA
−
⇒ System of CFSMs Choreography
synchronous CFSMs one-buer
convergence ⇒ branching condition
asynchronous CFSMs unbounded-buers
convergence ⇒ no mixed choices
branching condition = indipendent moves
no mixed choices = single point of choice
Intended benets: dismissing the orchestrator, so reducing the
communication overhead.
62. Relating Contract Automata and Choreographies
Decentralization
Orchestrator KSA
−
⇒ System of CFSMs Choreography
synchronous CFSMs one-buer
convergence ⇒ branching condition
asynchronous CFSMs unbounded-buers
convergence ⇒ no mixed choices
branching condition = indipendent moves
no mixed choices = single point of choice
Intended benets: dismissing the orchestrator, so reducing the
communication overhead.
63. Relating Contract Automata and Choreographies
Translation
q0start q1
q3 q4
(a, a, )
( , b, b) ( , b, b)
(a, a, )
KSA⊗B⊗C A KSA⊗B⊗C B KSA⊗B⊗C C
q0start
q1
a@AB
q0start
q1 q3
q2
a@AB
b@BC
a@AB
b@BC
q0start
q1
b@BC
64. Relating Contract Automata and Choreographies
Decentralization
qB10
qB11
qB12
qB13
price
quote1
contrib
Buyer B1
qB20
qB21
qB22
qB23
qB24
quote2 contrib
ok
nop
delivery
Buyer Good_B2
qS 0
qS 1
qS 2
qS 3
qS 4
qS 5
price
quote1
quote2
ok
nop delivery
Seller S
q0
q1 q2
q3 q4
q5 q6
q7
(price, , price)
(quote1
, , quote1
)
( , quote2
, quote2
)
(contrib, , )
(contrib, contrib, )
( , ok, ok)
( , nop, nop)
( , delivery, delivery)
KSB1⊗Good_B2⊗S
State [2,0,2] (q2) violates the branching condition because it
has no transition labelled [contrib!,contrib?,0] which is instead
enabled in state [2,1,3] (q3)
65. Relating Contract Automata and Choreographies
Decentralization Fix
qB10
qB11
qB12
qB13
price
quote1
contrib
Buyer B1
qB20
qB21
qB22
qB23
qB24
quote2 contrib
ok
nop
delivery
Buyer Good_B2
qS 0
qS 1
qS 2
qS 3
qS 4
qS 5
price
quote2
quote1
ok
nop delivery
Seller Good_S
q0
q1 q2
q3 q4
q5 q6
q7
(price, , price)
( , quote2
, quote2
)
(quote1
, , quote1
)
(contrib, , )
(contrib, contrib, )
( , ok, ok)
( , nop, nop)
( , delivery, delivery)
KSB1⊗Good_B2⊗Good_S
The CA enjoys the branching condition
The CA has no mixed choice states
66. Relating Contract Automata and Choreographies
Question 1
Question
What is the impact of the assumptions for removing the orchestrator?
One-buer semantics: necessary and sucient conditions;
Unbounded semantics: false positives convergent systems with
mixed choices.
In this case, there are trace equivalent systems (up to dummy
transitions) that are not rejected by our analysis (i.e. with no mixed
choices).
67. Relating Contract Automata and Choreographies
Example: removing mixed choices
q0start q1
q2 q3
(a, a)
(b, b) (b, b)
(a, a)
(a) A ⊗ B (A = a.b + b.a, B = b.a + a.b)
q0start
q1
q2 q3
q4 q5
(d1, , d1)
( , d2, d2)
(a, a, )
(b, b, )
(b, b, )
(a, a, )
(b) KA⊗B⊗D (A = d1.a.b + b.a, B = d2.b.a + a.b, D = d1 + d2)
68. Relating Contract Automata and Choreographies
Question 2
Question
Dierences between product of CA and choreography extraction
CFSMs know their partners (FIFO buers);
our assumptions: CA are oblivious of their partners;
automatic synthesis of the orchestrator enforcing agreement;
dierent policies of orchestration;
compositionality;
liable detection.
70. Relating Contract Automata and Logics
Propositional Contract Logic
Intuitionistic logic extended with contractual implication for solving
circular dependencies
Example
Alice says I will lend you my aeroplane provided that you lend me
your bike = b → a.
Bob says I will lend you my bike on credit that in the future you will
lend me your aeroplane and your car=(a ∧ c) b
Charlie I will lend you my car= c
Agreement: (b → a) ∧ ((a ∧ c) b) ∧ c a ∧ c ∧ b.
71. Relating Contract Automata and Logics
H-PCL to CA
q11start q21
b
a
(a) Alice
q12start q22
q32
q42
a
c
b
b
c
a
b b
(b) Bob
q13start
c
(c) Charlie
q1start q2 q3
q4 q5 q6
(b, b, )
( , c, c)
( , b, )
(a, a, )
( , c, c) ( , c, c)
(a, , ), ( , b, )
( , , c)
(b, b, )
( , b, ), ( , , c)
(a, a, )
(a, , ), ( , b, ), ( , , c)
(d) K Alice ⊗ Bob ⊗ Charlie
72. Relating Contract Automata and Logics
H-PCL to CA: results
Theorem (PCL agreement)
p λ(p) if and only if p admits agreement.
Theorem (PCL Weak Agreement)
p(→) λ(p(→)) if and only if p(→) admits weak agreement.
Logic interpretation of W: → lifted to ;
Intended Benets:
deduction trees of PCL formulae through CA algorithms;
p ⊗ A admits Z, A, W?
73. Relating Contract Automata and Logics
H-PCL to CA: results
Theorem (PCL agreement)
p λ(p) if and only if p admits agreement.
Theorem (PCL Weak Agreement)
p(→) λ(p(→)) if and only if p(→) admits weak agreement.
Logic interpretation of W: → lifted to ;
Intended Benets:
deduction trees of PCL formulae through CA algorithms;
p ⊗ A admits Z, A, W?
74. Relating Contract Automata and Logics
Intuitionistic Linear Logic with mix
Resource cannot always be duplicated or contracted at will;
Possibility of recording debts a⊥.
Annihilation principle, a ⊗ a⊥ 1: a credit and a debit of the same
resource can be cancelled out;
Useful for modelling circular dependencies:
Alice: b a
Bob: a⊥
⊗ c⊥
⊗ b
Charlie: c
Agreement: Alice ⊗ Bob ⊗ Charlie , all resources are consumed
75. Relating Contract Automata and Logics
H-ILLmix
to CA
q11start q21
q31
b a
(a) Alice
q12start q22
q32
q42
q52
q62
q72
q82
a
c
b
b
c
a
b
b
a
c c
a
(b) Bob
q13start q23
c
(c) Charlie
q1start q2 q3
q4 q5 q6
(b, b, )
( , c, c)
(a, a, )
( , c, c) ( , c, c)
(b, b, −) (a, a, )
(d) K Alice Bob Charlie
76. Relating Contract Automata and Logics
H-ILLmix
to CA: Results
Theorem (ILLmix Agreement)
Γ Z i Γ admits agreement on Z
Intended Benets:
Characterization of A through ILLmix ;
Γ ⊗ A admits Z, A, W?
Γ, Γ Z i Γ Γ admits A
77. Relating Contract Automata and Logics
H-ILLmix
to CA: Results
Theorem (ILLmix Agreement)
Γ Z i Γ admits agreement on Z
Intended Benets:
Characterization of A through ILLmix ;
Γ ⊗ A admits Z, A, W?
Γ, Γ Z i Γ Γ admits A
78. A Tool for Contract Automata
Section 5
A Tool for Contract Automata
79. A Tool for Contract Automata
Contract Automata Tool
AMPL models CAT API JAMATAuses extends
fully automatize our proposal;
uses ecient linear programming techniques for checking the
properties of a CA;
has been adopted for verifying service-based applications;
CAT is available at
https://github.com/davidebasile/workspace.
81. A Tool for Contract Automata
Summarizing Verifying 2BP with CAT
B1 ⊗ GoodB2 ⊗ GoodS Z A W @@@@@@@hhhhhhhOrchestrator
B1 ⊗ GoodB2 ⊗ S Z A W Orchestrator
B1 ⊗ NotSoBadB2 ⊗ S ƒƒZ dA W Orchestrator
B1 ⊗ BadB2 ⊗ S ƒƒZ dA W Orchestrator
NotSoBadB2 x circularity GoodB2
S x branching condition GoodS
83. Conclusions
Conclusions
The problem of specifying and verifying service-based applications has been
tackled in the thesis, with the following outcomes:
ecient model checking techniques for contract compliance;
a novel compositional formal model of service contracts with
algorithms for ensuring safety while assuming a malicious environment;
Control Theory and Linear Programming verication techniques for
distributed applications;
a linear and a non linear intuitionistic logical interpretation of
contracts;
conditions for relating two coordination mechanism: orchestration and
choreography, so reducing the communication overhead;
turn the developed theory into a prototypical tool.
84. Conclusions
Future work
Future work:
using the controller for amending detected errors;
deepening the formal verication of services through linear
programming techniques;
improving the proposed tool with a user-friendly interface, integration
with other existing tools.
85. Conclusions
Publications
International Journals:
1 Basile, D., Degano, P., Ferrari, G.L.: A formal framework for secure and complying services. The
Journal of Supercomputing 69(1), 4352 (2014);
2 Basile D. , Degano P. , Ferrari G.L. , Tuosto E.: Relating two automata-based models of
orchestration and choreography, Journal of Logical and Algebraic Methods in Programming, Volume
85, Issue 3, April 2016, Pages 425-446, ISSN 2352-2208;
3 Basile, D., Degano, P., Ferrari, G.L.: Automata for specifying and orchestrating service contracts. To
appear in Journal of Logical Methods in Computer Science (2016), ISSN: 1860-5974;
International Conferences and Workshops:
1 Basile, D.: Service interaction contracts as security policies. In: ICTCS 2012, Varese, Italy, available
online at http://ictcs.di.unimi.it/papers/paper_28.pdf;
2 Basile, D., Degano, P., Ferrari, G.L.: Secure and unfailing services. In: Malyshkin, V. (ed.) PaCT.
LNCS, vol. 7979, pp. 167181. Springer (2013);
3 Basile, D., Degano, P., Ferrari, G.L.: Automata for service contracts. In: Hot Issues in Security
Principles and Trust - 2nd Workshop, HOTSPOT 2014, Grenoble, France;
4 Basile, D., Degano, P., Ferrari, G.L.: Automata for analysing service contracts. In: Trustworthy
Global Computing - 9th International Symposium, TGC 2014. Revised Selected Papers, LNCS, vol.
8902, pp. 3450. Springer (2014);
5 Basile, D., Degano, P., Ferrari, G.L., Tuosto, E.: From orchestration to choreography through
contract automata. In: Lanese, I., Lluch-Lafuente, A., Sokolova, A., Vieira, H.T. (eds.) Proceedings
7th Interaction and Concurrency Experience 2014, Berlin, Germany. EPTCS, vol. 166,;
6 Basile, D., Degano, P., Ferrari, G.L., Tuosto, E.: Playing with our CAT and Communication-Centric
Applications. To appear in Formal Techniques for Networked and Distributed Systems (FORTE)
2016, LNCS, volume 9688, 2016.