Theory of stable models is the mathematical basis of answer set programming. Several results in that theory refer to the concept of the positive dependency graph of a logic program. We describe a modification of that ...
详细信息
Hybrid Knowledge Bases based on Lifschitz’s logic of Minimal Knowledge with Negation as Failure are a successful approach to combine the expressivity of Description logics and logic programming in a single language. ...
详细信息
We weaken the notion of "not subject to occur-check" (NSTO), on which most known results on avoiding the occur-check in logic programming are based. NSTO means that unification is performed only on such pair...
详细信息
Modern scientific software stacks have become extremely complex, using many programming models and libraries to exploit a growing variety of GPUs and accelerators. Package managers can mitigate this complexity using d...
详细信息
We propose a calculus of string diagrams to reason about satisfiability of Boolean formulas, and prove it to be sound and complete. We then showcase our calculus in a few case studies. First, we consider SAT-solving. ...
详细信息
The definition of choreography specification languages for Service Oriented Systems poses important challenges. Mainstream approaches tend to focus on procedural aspects, leading to over-constrained and over-specified...
详细信息
The definition of choreography specification languages for Service Oriented Systems poses important challenges. Mainstream approaches tend to focus on procedural aspects, leading to over-constrained and over-specified models. Because of such a drawback, declarative languages are gaining popularity as a better way to model service choreographies. A similar issue was met in the Multi-Agent Systems domain, where declarative approaches based on social semantics have been used to capture the nature of agent interaction without over-constraining their behaviour. In this work, we present an integrated framework capable to cover the entire cycle of specification and verification of choreographies, by mixing approaches coming from the Service Oriented Computing and Multi-Agent Systems research domains. SCIFF is the underlying logic programming framework for modelling and verifying interaction in open systems. The use of SCIFF brings us two main advantages: (1) it allows us to capture within a single framework different aspects of a choreography, ranging from constraints on the flow of messages to effects and commitments resulting from their exchange;(2) it provides an operational model that can be exploited to perform a variety of verification tasks.
Although moral responsibility is not circumscribed by causality, they are both closely intermixed. Furthermore, rationally understanding the evolution of the physical world is inherently linked with the idea of causal...
详细信息
Context: Constraint solvers basically attempt to provide test data satisfying a given path constraint. However, a major difficulty is that fault does not reveal in many cases unless the input data fall in a particular...
详细信息
We address the problem of verifying that the functions of a program meet their contracts, specified by pre/postconditions. We follow an approach based on constrained Horn clauses (CHCs) by which the verification probl...
详细信息
Instrumenting legacy code is an effective approach to enforce security policies. Formal correctness of this approach in the realm of audit logging relies on semantic frameworks that leverage information algebra to mod...
详细信息
ISBN:
(数字)9781665488105
ISBN:
(纸本)9781665488112
Instrumenting legacy code is an effective approach to enforce security policies. Formal correctness of this approach in the realm of audit logging relies on semantic frameworks that leverage information algebra to model and compare the information content of the generated audit logs and the program at runtime. Previous work has demonstrated the applicability of instrumentation techniques in the enforcement of audit logging policies for systems with microservices architecture. However, the specified policies suffer from the limited expressivity power as they are confined to Horn clauses being directly used in logic programming engines. In this paper, we explore audit logging specifications that go beyond Horn clauses in certain aspects, and the ways in which these specifications are automatically enforced in microservices. In particular, we explore an instrumentation tool that rewrites Java-based microservices according to a JSON specification of audit logging requirements, where these logging requirements are not limited to Horn clauses. The rewritten set of microservices are then automatically enabled to generate audit logs that are shown to be formally correct.
暂无评论