Catálogo de publicaciones - libros

Compartir en
redes sociales


Foundations of Software Science and Computational Structures: 9th International Conference, FOSSACS 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, ViennVienna, Austria, March 25-31,

Luca Aceto ; Anna Ingólfsdóttir (eds.)

En conferencia: 9º International Conference on Foundations of Software Science and Computation Structures (FoSSaCS) . Vienna, Austria . March 25, 2006 - March 31, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

No disponibles.

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-33045-5

ISBN electrónico

978-3-540-33046-2

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

A Semantic Approach to Interpolation

Andrei Popescu; Traian Florin Şerbănuţă; Grigore Roşu

Interpolation results are investigated for various types of formulae. By shifting the focus from syntactic to , we generate, prove and classify a series of interpolation results for first-order logic. A few of these results non-trivially generalize known interpolation results. All the others are new.

- Automata and Logic | Pp. 307-321

First-Order and Counting Theories of -Automatic Structures

Dietrich Kuske; Markus Lohrey

The logic extends first-order logic by a generalized form of counting quantifiers (“the number of elements satisfying ... belongs to the set ”). This logic is investigated for structures with an injective -automatic presentation. If first-order logic is extended by an infinity-quantifier, the resulting theory of any such structure is known to be decidable [4]. It is shown that, as in the case of automatic structures [13], also modulo-counting quantifiers as well as infinite cardinality quantifiers (“there are many elements satisfying ...”) lead to decidable theories. For a structure of bounded degree with injective -automatic presentation, the fragment of that contains only effective quantifiers is shown to be decidable and an elementary algorithm for this decision is presented. Both assumptions (-automaticity and bounded degree) are necessary for this result to hold.

- Automata and Logic | Pp. 322-336

Parity Games Played on Transition Graphs of One-Counter Processes

Olivier Serre

We consider parity games played on special pushdown graphs, namely those generated by one-counter processes. For parity games on pushdown graphs, it is known from [23] that deciding the winner is an -complete problem. An important corollary of this result is that the -calculus model checking problem for pushdown processes is -complete. As one-counter processes are special cases of pushdown processes, it follows that deciding the winner in a parity game played on the transition graph of a one-counter process can be achieved in . Nevertheless the proof for the -hardness lower bound of [23] cannot be adapted to that case. Therefore, a natural question is whether the upper bound can be improved in this special case. In this paper, we adapt techniques from [11,4] and provide a upper bound and a -hard lower bound for this problem. We also give two important consequences of this result. First, we improve the best upper bound known for model-checking one-counter processes against -calculus. Second, we show how these games can be used to solve pushdown games with winning conditions that are Boolean combinations of a parity condition on the control states with conditions on the stack height.

- Automata and Logic | Pp. 337-351

Bidomains and Full Abstraction for Countable Nondeterminism

James Laird

We describe a denotational semantics for a sequential functional language with random number generation over a countably infinite set (the natural numbers), and prove that it is fully abstract with respect to may-and-must testing.

Our model is based on biordered sets similar to Berry’s bidomains, and stable, monotone functions. However, (as in prior models of unbounded non-determinism) these functions may not be continuous. Working in a biordered setting allows us to exploit the different properties of both extensional and stable orders to construct a Cartesian closed category of sequential, discontinuous functions, with least and greatest fixpoints having strong enough properties to prove computational adequacy.

We establish full abstraction of the semantics by showing that it contains a simple, first-order “universal type-object” within which all types may be embedded using functions defined by (countable) ordinal induction.

- Domains, Lambda Calculus, Types | Pp. 352-366

An Operational Characterization of Strong Normalization

Luca Paolini; Elaine Pimentel; Simona Ronchi Della Rocca

This paper introduces the Φ-calculus, a new call-by-value version of the -calculus, following the spirit of Plotkin’s -calculus. The Φ-calculus satisfies some interesting properties, in particular that its set of solvable terms coincides with the set of -strongly normalizing terms in the classical -calculus.

- Domains, Lambda Calculus, Types | Pp. 367-381

On the Confluence of -Calculus with Conditional Rewriting

Frédéric Blanqui; Claude Kirchner; Colin Riba

The confluence of untyped -calculus with rewriting has already been studied in various directions. In this paper, we investigate the confluence of -calculus with rewriting and provide general results in two directions. First, when conditional rules are algebraic. This extends results of Müller and Dougherty for unconditional rewriting. Two cases are considered, whether beta-reduction is allowed or not in the evaluation of conditions. Moreover, Dougherty’s result is improved from the assumption of strongly normalizing -reduction to weakly normalizing -reduction. We also provide examples showing that outside these conditions, modularity of confluence is difficult to achieve. Second, we go beyond the algebraic framework and get new confluence results using a restricted notion of orthogonality that takes advantage of the conditional part of rewrite rules.

- Domains, Lambda Calculus, Types | Pp. 382-397

Guessing Attacks and the Computational Soundness of Static Equivalence

Martín Abadi; Mathieu Baudet; Bogdan Warinschi

The indistinguishability of two pieces of data (or two lists of pieces of data) can be represented formally in terms of a relation called static equivalence. Static equivalence depends on an underlying equational theory. The choice of an inappropriate equational theory can lead to overly pessimistic or overly optimistic notions of indistinguishability, and in turn to security criteria that require protection against impossible attacks or—worse yet—that ignore feasible ones. In this paper, we define and justify an equational theory for standard, fundamental cryptographic operations. This equational theory yields a notion of static equivalence that implies computational indistinguishability. Static equivalence remains liberal enough for use in applications. In particular, we develop and analyze a principled formal account of guessing attacks in terms of static equivalence.

- Security | Pp. 398-412

Handling exp,× (and Timestamps) in Protocol Analysis

Roberto Zunino; Pierpaolo Degano

We present a static analysis technique for the verification of cryptographic protocols, specified in a process calculus. Rather than assuming a specific, fixed set of cryptographic primitives, we only require them to be specified through a term rewriting system, with no restrictions. Examples are provided to support our analysis. First, we tackle forward secrecy for a Diffie-Hellman-based protocol involving exponentiation, multiplication and inversion. Then, a simplified version of Kerberos is analyzed, showing that its use of timestamps succeeds in preventing replay attacks.

- Security | Pp. 413-427

Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario

Michael Backes; Sebastian Mödersheim; Birgit Pfitzmann; Luca Viganò

Web services are an important series of industry standards for adding semantics to web-based and XML-based communication, in particular among enterprises. Like the entire series, the security standards and proposals are highly modular. Combinations of several standards are put together for testing as interoperability scenarios, and these scenarios are likely to evolve into industry best practices. In the terminology of security research, the interoperability scenarios correspond to security protocols. Hence, it is desirable to analyze them for security. In this paper, we analyze the security of the new Secure WS-ReliableMessaging Scenario, the first scenario to combine security elements with elements of another quality-of-service standard. We do this both symbolically and cryptographically. The results of both analyses are positive. The discussion of actual cryptographic primitives of web services security is a novelty of independent interest in this paper.

- Security | Pp. 428-445