Logtalk, an object oriented logicprogramming language, provides experimental support for multi-threading programming with selected back-end Prolog compilers. By making use of core, low-level Prolog predicates that in...
详细信息
ISBN:
(纸本)9783540774419
Logtalk, an object oriented logicprogramming language, provides experimental support for multi-threading programming with selected back-end Prolog compilers. By making use of core, low-level Prolog predicates that interface with operating-system native threads, Logtalk provides a high-level set of directives and predicates that allows programmers to easily take advantage of modern multi-processor and multi-core computers without worrying about the details of creating, synchronizing, or communicating with threads. Logtalk multi-threading programming features include support for concurrent calls akin to and-parallelism and or-parallelism, non- deterministic thread goals, asynchronous calls, and predicate synchronization. The integration with the Logtalk object-oriented features allows objects to send and receive both synchronous and asynchronous messages and to call local predicates concurrently. Logtalk multi-threading features are orthogonal to object-oriented concepts and can be useful even in the context of plain Prolog.
This paper identifies potential security loopholes in the implementation of support for meta-predicates Closing these loopholes depends on three conditions: a clear distinction between closures and goals, support for ...
详细信息
ISBN:
(纸本)9783540929949
This paper identifies potential security loopholes in the implementation of support for meta-predicates Closing these loopholes depends on three conditions: a clear distinction between closures and goals, support for an extended meta-predicate directive that allows the specification of closures, and the availability of the call/2-N family of built-in meta-predicates. These conditions provide the basis for a set of simple safety rules that allows meta-predicates to be securely supported. These safety rules are currently implemented by Logtalk, all object-oriented logicprogramming language, and may also be applied in the context of Prolog predicate-based module systems. Experimental results illustrate how these rules can prevent several security problems, including accidental or malicious changes to the original meta-predicate arguments and bypassing of predicate scope rules and predicate scope directives.
An important problem in network security risk assessment is to uncover network threats due to current software vulnerabilities and misconfigurations. This paper proposes a logic-programming approach to conduct this ri...
详细信息
ISBN:
(纸本)9781424442461
An important problem in network security risk assessment is to uncover network threats due to current software vulnerabilities and misconfigurations. This paper proposes a logic-programming approach to conduct this risk assessment automatically. We use Datalog to specify network security property states and attack rules. The threat analysis could be conducted by a logic-programming engine that can evaluate Datalog efficiently (such as XSB [1]). We analyze trace proofs produced by the reasoning engine, and get threat information of evaluated network system. After identifying the threats, we apply game theory to compute threat risks. A simple network attack has been simulated to illuminate the appliance of the new approach. Results on how the approach has been able to help the system administrator understand the threat risks of attacks and take countermeasures accordingly are also analyzed.
暂无评论