Global Computing. Programming Environments, Languages, Security, and Analysis of Systems


Book Description

The goal of the IST/FET proactive initiative on Global Computing is to - tain models, frameworks, methods, algorithms to build systems that are ?exible, dependable, secure, robust and e?cient. The dominant concerns are those of handling the co-ordination and interaction, security, reliability, robustness, fa- uremodes,andcontrolofriskoftheentitiesinthesystemandtheoveralldesign, descriptionandperformanceofthesystemitself.Completelydi?erentparadigms of computer science may have to be developed to tackle these issues e?ectively. The research should concentrate on systems having the following characteristics: – The systems are composed of autonomous computational entities where - tivity is not centrally controlled, either because global control is impossible or impractical, or because the entities are controlled by di?erent owners. – The computational entities are mobile, due to the movement of the physical platforms or movement of the entity from one platform to another. – The con?guration varies over time. For instance, the system is open to the introduction of new computational entities and likewise their deletion. The behavior of the entities may vary over time. – The systems operate with incomplete information about the environment. For instance, information becomes rapidly out of date and mobility requires information about the environment to be discovered. Theultimategoaloftheresearchactionistoprovideasolidscienti?cfoundation for the design of such systems, and to lay the groundwork for achieving e?ective principles for building and analyzing such systems.




Quantitative Assessments of Distributed Systems


Book Description

Distributed systems employed in critical infrastructures must fulfill dependability, timeliness, and performance specifications. Since these systems most often operate in an unpredictable environment, their design and maintenance require quantitative evaluation of deterministic and probabilistic timed models. This need gave birth to an abundant literature devoted to formal modeling languages combined with analytical and simulative solution techniques The aim of the book is to provide an overview of techniques and methodologies dealing with such specific issues in the context of distributed systems and covering aspects such as performance evaluation, reliability/availability, energy efficiency, scalability, and sustainability. Specifically, techniques for checking and verifying if and how a distributed system satisfies the requirements, as well as how to properly evaluate non-functional aspects, or how to optimize the overall behavior of the system, are all discussed in the book. The scope has been selected to provide a thorough coverage on issues, models. and techniques relating to validation, evaluation and optimization of distributed systems. The key objective of this book is to help to bridge the gaps between modeling theory and the practice in distributed systems through specific examples.




Software Engineering for Multi-Agent Systems V


Book Description

The papers selected for this volume present advances in software engineering approaches to develop dependable high-quality multi-agent systems. These papers describe experiences and techniques associated with large multi-agent systems in a wide variety of problem domains. They cover fault tolerance, exception handling and diagnosis, security and trust, verification and validation, as well as early development phases and software reuse.




Processes, Terms and Cycles: Steps on the Road to Infinity


Book Description

This Festschrift is dedicated to Jan Willem Klop on the occasion of his 60th birthday. The volume comprises a total of 23 scientific papers by close friends and colleagues, written specifically for this book. The papers are different in nature: some report on new research, others have the character of a survey, and again others are mainly expository. Every contribution has been thoroughly refereed at least twice. In many cases the first round of referee reports led to significant revision of the original paper, which was again reviewed. The articles especially focus upon the lambda calculus, term rewriting and process algebra, the fields to which Jan Willem Klop has made fundamental contributions.




A Process Algebraic Approach to Software Architecture Design


Book Description

Inthe?eldofformalmethodsincomputerscience,concurrencytheoryisreceivinga constantlyincreasinginterest.Thisisespeciallytrueforprocessalgebra.Althoughit had been originally conceived as a means for reasoning about the semantics of c- current programs, process algebraic formalisms like CCS, CSP, ACP, ?-calculus, and their extensions (see, e.g., [154,119,112,22,155,181,30]) were soon used also for comprehendingfunctionaland nonfunctionalaspects of the behaviorof com- nicating concurrent systems. The scienti?c impact of process calculi and behavioral equivalences at the base of process algebra is witnessed not only by a very rich literature. It is in fact worth mentioningthe standardizationprocedurethat led to the developmentof the process algebraic language LOTOS [49], as well as the implementation of several modeling and analysis tools based on process algebra, like CWB [70] and CADP [93], some of which have been used in industrial case studies. Furthermore, process calculi and behavioral equivalencesare by now adopted in university-levelcourses to teach the foundations of concurrent programming as well as the model-driven design of concurrent, distributed, and mobile systems. Nevertheless, after 30 years since its introduction, process algebra is rarely adopted in the practice of software development. On the one hand, its technica- ties often obfuscate the way in which systems are modeled. As an example, if a process term comprises numerous occurrences of the parallel composition operator, it is hard to understand the communicationscheme among the varioussubterms. On the other hand, process algebra is perceived as being dif?cult to learn and use by practitioners, as it is not close enough to the way they think of software systems.




Mathematical Foundations of Computer Science 2004


Book Description

This volume contains the papers presented at the 29th Symposium on Mat- matical Foundations of Computer Science, MFCS 2004, held in Prague, Czech Republic, August 22–27, 2004. The conference was organized by the Institute for Theoretical Computer Science (ITI) and the Department of Theoretical Com- terScienceandMathematicalLogic(KTIML)oftheFacultyofMathematicsand Physics of Charles University in Prague. It was supported in part by the Eu- pean Association for Theoretical Computer Science (EATCS) and the European Research Consortium for Informatics and Mathematics (ERCIM). Traditionally, the MFCS symposia encourage high-quality research in all branches of theoretical computer science. Ranging in scope from automata, f- mal languages, data structures, algorithms and computational geometry to c- plexitytheory,modelsofcomputation,andapplicationsincludingcomputational biology, cryptography, security and arti?cial intelligence, the conference o?ers a unique opportunity to researchers from diverse areas to meet and present their results to a general audience. The scienti?c program of this year’s MFCS took place in the lecture halls of the recently reconstructed building of the Faculty of Mathematics and P- sics in the historical center of Prague, with the famous Prague Castle and other celebratedhistoricalmonumentsinsight.Theviewfromthewindowswasach- lengingcompetitionforthespeakersinthe?ghtfortheattentionoftheaudience. But we did not fear the result: Due to the unusually tough competition for this year’s MFCS, the admitted presentations certainly attracted considerable in- rest. The conference program (and the proceedings) consisted of 60 contributed papers selected by the Program Committee from a total of 167 submissions.




Formal Methods for Performance Evaluation


Book Description

This book presents a set of 11 papers accompanying the lectures of leading researchers given at the 7th edition of the International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2007, held in Bertinoro, Italy in May/June 2007. SFM 2007 was devoted to formal techniques for performance evaluation and covered several aspects of the field.




Algebraic Methodology and Software Technology


Book Description

This book constitutes the refereed proceedings of the 10th International Conference on Algebraic Methodology and Software Technology, AMAST 2004, held in Stirling, Scotland, UK in July 2004. The 35 revised full papers presented together with abstracts of 5 invited talks and an invited paper were carefully reviewed and selected from 63 submissions. Among the topics covered are all current issues in formal methods related to algebraic approaches to software engineering including abstract data types, process algebras, algebraic specification, model checking, abstraction, refinement, model checking, state machines, rewriting, Kleene algebra, programming logic, etc.







Secure Systems Development with UML


Book Description

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to developers who are not specialists in security. As one example, Jürjens uncovers a flaw in the Common Electronic Purse Specification, and proposes and verifies a correction. With a clear separation between the general description of his approach and its mathematical foundations, the book is ideally suited both for researchers and graduate students in UML or formal methods and security, and for advanced professionals writing critical applications.