Engineering Trustcom/Bigdatase 2018

Total Page:16

File Type:pdf, Size:1020Kb

Engineering Trustcom/Bigdatase 2018 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE 2018) New York, New York, USA 31 July - 3 August 2018 Pages 1-650 IEEE Catalog Number: CFP18TRU-POD ISBN: 978-1-5386-4389-1 1/3 Copyright © 2018 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP18TRU-POD ISBN (Print-On-Demand): 978-1-5386-4389-1 ISBN (Online): 978-1-5386-4388-4 ISSN: 2324-898X Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering TrustCom/BigDataSE 2018 Table of Contents Message from the IEEE TrustCom/BigDataSE 2018 General Chairs xli Message from the IEEE TrustCom 2018 Program Chairs xlii TrustCom 2018 Committee Members xliv TrustCom 2018 Technical Program Committee xlv Message from the BigDataSE 2018 Program Chairs xlviii BigDataSE 2018 Committee Members xlix IEEE TrustCom 2018 Track 1: Trust Track 1 Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating Trust 1 Scot Tucker (US Air Force Research Laboratory) A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud Computing 10 Yubiao Wang (Chongqing University, China), Junhao Wen (Chongqing University, China), Wei Zhou (Shenzhen Institutes of Advanced Technology, China), and Fengji Luo (The University of Sydney, Australia) One Secure Access Scheme Based on Trusted Execution Environment 16 Yongkai Fan (China University of Petroleum), Shengle Liu (China University of Petroleum), Gang Tan (Penn State University), Xiaodong Lin (China University of Petroleum), Guanqun Zhao (China University of Petroleum), and Jianrong Bai (China University of Petroleum) v Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial Networks 22 Tianao Ma (Wuhan University of Science and Technology, China), Wei Hu (Wuhan University of Science and Technology, China), Yonghao Wang (DMT Lab, Birmingham City University, UK), Dalia El-Banna (DMT Lab, Birmingham City University, UK), John Grant (Nine Tiles Networks Ltd, Cambridge, UK), and Hongjun Dai (Shandong University, Jinan, P.R. China) Track 1: Trust Track 2 Understanding Trust, Privacy and Financial Fears in Online Payment 28 Ghada El Haddad (University of Montreal, Montreal, Canada), Esma Aïmeur (University of Montreal, Montreal, Canada), and Hicham Hage (Notre Dame University, Zouk Mosbeh, Lebanon) DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart Contracts 37 Sebastian Friebe (Karlsruhe Institute of Technology), Ingo Sobik (esentri AG), and Martina Zitterbart (Karlsruhe Institute of Technology) Reputation Prediction Using Influence Conversion 43 Monika Ewa Rakoczy (SAMOVAR, CNRS, Telecom SudParis), Amel Bouzeghoub (SAMOVAR, CNRS, Telecom SudParis), Alda Lopes Gancarski (SAMOVAR, CNRS, Telecom SudParis), and Katarzyna Wegrzyn-Wolska (Efrei Paris) Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT Environments 49 Mostafa Kahla (Alexandria University, Egypt), Mohamed Azab (Informatics Research Institute, Egypt), and Ahmed Mansour (Alexandria University, Egypt) Track 1: Trust Track 3 Repoxy: Replication Proxy for Trustworthy SDN Controller Operation 55 Mohamed Azab (Informatics Research Institute, Egypt), Ahmed Hamdy (Department of Computer and Communications Engineering, Faculty of Engineering, Alexandria, Egypt), and Ahmed Mansour (Department of Electrical and Communication, Faculty of Engineering, Alexandria, Egypt) A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks 61 Concepcion Sanchez Aleman (Florida International University), Niki Pissinou (Florida International University), Sheila Alemany (Florida International University), and Georges Kamhoua (Florida International University) vi Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio Watermarking 68 Jian Chen (Sun Yat-sen University, China), Ziyang Chen (Sun Yat-sen University, China), Peijia Zheng (Sun Yat-sen University, China), Jianting Guo (Sun Yat-sen University, China), Wei Zhang (Fudan University, China), and Jiwu Huang (Shenzhen University, China) TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things 74 Bumjin Gwak (KAIST), Jin-Hee Cho (Army Research Laboratory), Dongman Lee (KAIST), and Heesuk Son (KAIST) Track 1: Trust Track 4 A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and Protection 86 Jian Chen (Sun Yat-sen University, China), Peijia Zheng (Sun Yat-sen University, China), Jianting Guo (Sun Yat-sen University, China), Wei Zhang (Fudan University), and Jiwu Huang (Fudan University, China) Dynamic Survivable Path Routing for Fast Changing IoT Network Topologies 92 Manu Elappila (National Institute of Technology Rourkela) and Suchismita Chinara (National Institute of Technology Rourkela) BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs 98 Zhaojun Lu (Huazhong University of Science and Technology, Wuhan, China), Qian Wang (University of Maryland, College Park), Gang Qu (University of Maryland, College Park), and Zhenglin Liu (Huazhong University of Science and Technology, Wuhan, China) Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure 104 Abu Shohel Ahmed (Aalto University) and Tuomas Aura (Aalto University) Track 1: Trust Track 5 N-Combat: A Nuisance Call Combating Framework for Internet Telephony 112 Ibrahim Javed (Institut Mines-Télécom, Télécom SudParis), Khalifa Toumi (Telecom SudParis, Institute Mines Telecom), and Noel Crespi (Telecom SudParis, Institute Mines Telecom) A Comprehensive Analysis of Packet Loss in MANETs 118 Muhammad Saleem Khan (COMSATS Institute of Information Technology, Islamabad, Pakistan), Saira Waris (COMSATS Institute of Information Technology, Islamabad, Pakistan), Idrees Ahmed (COMSATS Institute of Information Technology, Islamabad, Pakistan), and Majid Iqbal Khan (COMSATS Institute of Information Technology, Islamabad, Pakistan) Trust4App: Automating Trustworthiness Assessment of Mobile Applications 124 Sheikh Mahbub Habib (Technische Universitaet Darmstadt, Germany), Nikolaos Alexopoulos (Technische Universitaet Darmstadt, Germany), Md Monirul Islam (Technische Universitaet Darmstadt, Germany), Jens Heider (Fraunhofer SIT, Darmstadt, Germany), Stephen Marsh (University of Ontario -- Institute of Technology, Ontario, Canada), and Max Müehlhäeuser (Technische Universitaet Darmstadt, Germany) vii Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment 136 Shunan Ma (State Key Laboratory of Information Security, Institute of Information Engineering, CAS), Xunbo Shuai (PetroChina Research Institute of Petroleum Exploration & Development), Zhaohua Zhou (PetroChina Research Institute of Petroleum Exploration & Development), and Kechun Qiao (61516 Troops) Track 1: Trust Track 6 A Universal Secret Sharing Scheme with General Access Structure Based on CRT 142 Keju Meng (University of Science and Technology of China), Fuyou Miao (University of Science and Technology of China), Yue Yu (University of Science and Technology of China), and Changbin Lu (University of Science and Technology of China) ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-Learning 149 Gaosheng Liu (Tianjin University), Xin Wang (Tianjin University), Xiaohong Li (Tianjin University), Jianye Hao (Tianjin University), and Zhiyong Feng (Tianjin University) Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence Propagation 156 Antonio Caliò (DIMES, University of Calabria, Italy) and Andrea Tagarelli (DIMES, University of Calabria, Italy) Securing the Internet of Things (IoT): A Security Taxonomy for IoT 163 Syed Rizvi (Pennsylvania State University), Andrew Kurtz (Pennsylvania State University), Joseph Pfeffer (Pennsylvania State University), and Mohammad Rizvi (PricewaterhouseCoopers (PWC)) Track 1: Trust Track 7 A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer Networks 169 Dapeng Qu (Liaoning University), Dengyu Liang (Liaoning University), Songlin Wu (Liaoning University), Jie Li (University of Tsukuba), Weihong Xuan (Liaoning University), and Xingwei Wang (Northeastern University) Testing Sequence Generation Method Based on Unrelated Behaviors Serializing 177 Tao Sun (Inner Mongolia University), Xin Guo (Inner Mongolia University), and Ting Zhang (Inner Mongolia
Recommended publications
  • August 2018 FACS a C T S
    Issue 2018-1 August 2018 FACS A C T S The Newsletter of the Formal Aspects of Computing Science (FACS) Specialist Group ISSN 0950-1231 FACS FACTS Issue 2018-1 August 2018 About FACS FACTS FACS FACTS (ISSN: 0950-1231) is the newsletter of the BCS Specialist Group on Formal Aspects of Computing Science (FACS). FACS FACTS is distributed in electronic form to all FACS members. Submissions to FACS FACTS are always welcome. Please visit the newsletter area of the BCS FACS website for further details at: http://www.bcs.org/category/12461 Back issues of FACS FACTS are available for download from: http://www.bcs.org/content/conWebDoc/33135 The FACS FACTS Team Newsletter Editors Tim Denvir [email protected] Brian Monahan [email protected] Editorial Team Jonathan Bowen, John Cooke, Tim Denvir, Brian Monahan, Margaret West. Contributors to this issue Jonathan Bowen, John Cooke, Tim Denvir, Sofia Meacham. Brian Monahan, Bill Stoddart, Botond Virginas, Margaret West BCS-FACS websites BCS: http://www.bcs-facs.org LinkedIn: http://www.linkedin.com/groups?gid=2427579 Facebook: http://www.facebook.com/pages/BCS-FACS/120243984688255 Wikipedia: http://en.wikipedia.org/wiki/BCS-FACS If you have any questions about BCS-FACS, please send these to Paul Boca [email protected] 2 FACS FACTS Issue 2018-1 August 2018 Editorial Dear readers, welcome to our first issue of FACS FACTS for 2018. This year, 2018, marks the 40th anniversary of FACS. At least one editor recalls an article by Dan Simpson, member of the editorial team at the time, FACS at 10 in 1988.
    [Show full text]
  • Online Communities: Visualization and Formalization
    Online Communities: Visualization and Formalization Jonathan P. Bowen Museophile Limited, Oxford, UK [email protected] www.jpbowen.com Abstract. Online communities have increased in size and importance dramat- ically over the last decade. The fact that many communities are online means that it is possible to extract information about these communities and the con- nections between their members much more easily using software tools, despite their potentially very large size. The links between members of the community can be presented visually and often this can make patterns in the structure of sub-communities immediately obvious. The links and structures of layered com- munities can also be formalized to gain a better understanding of their modelling. This paper explores these links with some specific examples, including visualiza- tion of these relationships and a formalized model of communities using the Z notation. It also considers the development of such communities within the Com- munity of Practice social science framework. Such approaches may be applicable for communities associated with cybersecurity and could be combined for a better understanding of their development. 1 Introduction The development of collective human knowledge has always depended on communities. As communities have become more computer-based, it has become easier to monitor the activity of such interactions [7]. Recently the increasing use of online communities by the wider population (e.g., for social networking) has augmented the ways that com- munities can form and interact since geographical co-location is now much less critical than before the development of the Internet and the web [1,2].
    [Show full text]
  • Facing the Challenge of Automated Negotiation with Humans
    Facing the Challenge of Automated Negotiation with Humans A dissertation submitted by Angela Fabregues Vinent at Universitat Aut`onomade Barcelona to fulfill the degree of PhD in Computer Science. Bellaterra, September 18th, 2012 Director: Prof. Carles Sierra Tutor: Dr. Josep Puyol Elaborated at: Institut d’ Investigaci´o en Intel·lig`encia Artificial Consejo Superior de Investigaciones Cient´ıficas (IIIA-CSIC) Acknowledgements Voldria agrair a molta gent el temps que ha compartit amb mi aquests darrers anys corresponents a la realitzaciod'aquesta tesi doctoral. Especialment, voldria donar les graciesa en Juan Carlos. Sempre m'has acompanyat. Sempre m'has ajudat. Sempre has estat allaquan t'he necessitat, ja fossis al meu costat o a milles enfora. Ara que nos veim cada dia, esper no te cansis de jo. T'estim! Molts coneixements previs he hagut de menester. Molts altres els he adquirit pel cam.L'escola, l'institut, la carrera i el mastera l'IIIA m'han aportat molts d'ells. Tambeel meu pas per l'empresa privada, per tot arreu s'apren. Els valors, en canvi, s'aprenen a casa. Els vaig aprendre a Menorca graciesals meus pares i tambeals meus germans. Papa! Mama! Me vau donar una infanciaimpressionant, envoltada d'un entorn ple de coses per experimentar sentint-me segura i protegida. Me vau deixar creixer,que formessa meva propia personalitat, que anesagafant responsabilitats, i que fos lliure de decidir per jo mateixa lo que ningumespodia decidir. Vau conar en jo i me vau nancar els estudis a Barcelona. Casi res! Moltes graciesper tot. Bep, amb tu vaig aprendre a enraonar, a donar mil voltes a ses coses i a poder veure-les des de diferents punts de vista.
    [Show full text]
  • Towards Verified Systems
    TOWARDS VERIFIED SYSTEMS edited by Jonathan Bowen TOWARDS VERIFIED SYSTEMS edited by Jonathan Bow en safemos i This page delib erately left blank for publisher's use ii This page delib erately left blank for publisher's use iii This page delib erately left blank for publisher's use iv This page delib erately left blank for publisher's use Contents Foreword xvii Preface xix Contact Addresses xxiii I Intro duction 1 1 Safety-Critical Systems and Formal Metho ds 3 1.1 A Brief Historical Persp ective ::::::::::::::::::::::::: 3 1.2 Safety-critical Computer Systems ::::::::::::::::::::::: 5 1.2.1 Dep endable computer systems :: :: :: :: :: ::: :: :: :: :: 6 1.2.2 Formal metho ds ::::::::::::::::::::::::::::: 7 1.2.3 The cost of software safety ::::::::::::::::::::::: 9 1.3 Industrial-scale Examples of Use :: ::: :: :: :: :: ::: :: :: :: :: 11 1.3.1 Aviation ::::::::::::::::::::::::::::::::: 12 1.3.2 Railway systems :: :: :: ::: :: :: :: :: ::: :: :: :: :: 13 1.3.3 Nuclear p ower plants :: :: ::: :: :: :: :: ::: :: :: :: :: 13 1.3.4 Medical systems ::::::::::::::::::::::::::::: 14 1.3.5 Ammunition control :: :: ::: :: :: :: :: ::: :: :: :: :: 16 1.3.6 Emb edded micropro cessors ::::::::::::::::::::::: 17 1.4 Areas of Application of Formal Metho ds :: :: :: :: ::: :: :: :: :: 18 1.4.1 Requirements capture ::::::::::::::::::::::::: 19 1.4.2 Design : ::: :: :: :: :: ::: :: :: :: :: ::: :: :: :: :: 19 1.4.3 Compilation ::::::::::::::::::::::::::::::: 20 1.4.4 Programmable hardware :: ::: :: :: :: :: ::: :: :: :: :: 21 1.4.5 Do cumentation :::::::::::::::::::::::::::::
    [Show full text]
  • Current Issue of FACS FACTS
    Issue 2021-2 July 2021 FACS A C T S The Newsletter of the Formal Aspects of Computing Science (FACS) Specialist Group ISSN 0950-1231 FACS FACTS Issue 2021-2 July 2021 About FACS FACTS FACS FACTS (ISSN: 0950-1231) is the newsletter of the BCS Specialist Group on Formal Aspects of Computing Science (FACS). FACS FACTS is distributed in electronic form to all FACS members. Submissions to FACS FACTS are always welcome. Please visit the newsletter area of the BCS FACS website for further details at: https://www.bcs.org/membership/member-communities/facs-formal-aspects- of-computing-science-group/newsletters/ Back issues of FACS FACTS are available for download from: https://www.bcs.org/membership/member-communities/facs-formal-aspects- of-computing-science-group/newsletters/back-issues-of-facs-facts/ The FACS FACTS Team Newsletter Editors Tim Denvir [email protected] Brian Monahan [email protected] Editorial Team: Jonathan Bowen, John Cooke, Tim Denvir, Brian Monahan, Margaret West. Contributors to this issue: Jonathan Bowen, Andrew Johnstone, Keith Lines, Brian Monahan, John Tucker, Glynn Winskel BCS-FACS websites BCS: http://www.bcs-facs.org LinkedIn: https://www.linkedin.com/groups/2427579/ Facebook: http://www.facebook.com/pages/BCS-FACS/120243984688255 Wikipedia: http://en.wikipedia.org/wiki/BCS-FACS If you have any questions about BCS-FACS, please send these to Jonathan Bowen at [email protected]. 2 FACS FACTS Issue 2021-2 July 2021 Editorial Dear readers, Welcome to the 2021-2 issue of the FACS FACTS Newsletter. A theme for this issue is suggested by the thought that it is just over 50 years since the birth of Domain Theory1.
    [Show full text]
  • 1 Publications
    1 Publications Chronological list [1] Martin Fränzle. Verification of compilers for recursive occam-like languages. ProCoS Technical Report Kiel MF 8/1, Christian-Albrechts-Universität Kiel, Germany, 1990. [2] Martin Fränzle. Operational failure approximation. In Dines Bjørner, Hans Langmaack, and C. A. R. Hoare, editors, Monograph of the ESPRIT BRA 3104 ProCoS (Provably Correct Systems), pages 165–206. Technical Report, Dept. of Computer Science, Technical University of Denmark, 1992. [3] B. Buth, K.-H. Buth, M. Fränzle, B. von Karger, Y. Lakhneche, H. Langmaack, and M. Müller- Olm. Provably correct compiler development and implementation. In U. Kastens and P. Pfahler, editors, Compiler Construction, volume 641 of Lecture Notes in Computer Science, pages 141–155. Springer-Verlag, 1992. [4] Jonathan P. Bowen, Martin Fränzle, Ernst-Rüdiger Olderog, and Anders P. Ravn. Developing correct systems. In Proc. 5th Euromicro Workshop on Real-Time Systems, Oulu, Finland, pages 176–189. IEEE Computer Society Press, June 1993. [5] Martin Fränzle and Markus Müller-Olm. Drift and granularity of time in real-time system implementation. ProCoS Technical Report Kiel MF 10/2, Christian-Albrechts-Universität Kiel, Germany, August 1993. [6] Martin Fränzle and Burghard von Karger. Proposal for a programming language core for ProCoS II. ProCoS Technical Report Kiel MF 11/3, Christian-Albrechts-Universität Kiel, Ger- many, August 1993. [7] M. R. Hansen, E.-R. Olderog, M. Schenke, M. Fränzle, B. von Karger, M. Müller-Olm, and H. Rischel. A Duration Calculus semantics for real-time reactive systems. ProCoS II document [OLD MRH 1/1], Oldenburg Universität, Germany, September 1993. [8] Martin Fränzle and Markus Müller-Olm.
    [Show full text]
  • August 2014 FACS a C T S
    Issue 2014-1 August 2014 FACS A C T S The Newsletter of the Formal Aspects of Computing Science (FACS) Specialist Group ISSN 0950-1231 FACS FACTS Issue 2014-1 August 2014 About FACS FACTS FACS FACTS (ISSN: 0950-1231) is the newsletter of the BCS Specialist Group on Formal Aspects of Computing Science (FACS). FACS FACTS is distributed in electronic form to all FACS members. Submissions to FACS FACTS are always welcome. Please visit the newsletter area of the BCS FACS website for further details (see http://www.bcs.org/category/12461). Back issues of FACS FACTS are available for download from: http://www.bcs.org/content/conWebDoc/33135 The FACS FACTS Team Newsletter Editors Tim Denvir [email protected] Brian Monahan [email protected] Editorial Team Jonathan Bowen, Tim Denvir. Brian Monahan, Margaret West. Contributors to this Issue Jonathan Bowen, Tim Denvir, Eerke Boiten, Rob Heirons, Azalea Raad, Andrew Robinson. BCS-FACS websites BCS: http://www.bcs-facs.org LinkedIn: http://www.linkedin.com/groups?gid=2427579 Facebook: http://www.facebook.com/pages/BCS- FACS/120243984688255 Wikipedia: http://en.wikipedia.org/wiki/BCS-FACS If you have any questions about BCS-FACS, please send these to Paul Boca <[email protected]> 2 FACS FACTS Issue 2014-1 August 2014 Editorial Welcome to issue 2014-1 of FACS FACTS. This is the first issue produced by your new joint editors, Tim Denvir and Brian Monahan. One effect of the maturity of formal methods is that researchers in the topic regularly grow old and expire. Rather than fill the issue with Obituaries, we have taken the course of reporting on most of these sad events in brief, with references to fuller obituaries that can be found elsewhere, in particular in the FAC Journal.
    [Show full text]
  • When Shannon Met Turing
    DOI: http://dx.doi.org/10.14236/ewic/EVA2017.9 Life in Code and Digits: When Shannon met Turing Tula Giannini Jonathan P. Bowen Dean and Professor Professor of Computing School of Information School of Engineering Pratt Institute London South Bank University New York, USA London, UK http://mysite.pratt.edu/~giannini/ http://www.jpbowen.com [email protected] [email protected] Claude Shannon (1916–2001) is regarded as the father of information theory. Alan Turing (1912– 1954) is known as the father of computer science. In the year 1943, Shannon and Turing were both at Bell Labs in New York City, although working on different projects. They had discussions together, including about Turing’s “Universal Machine,” a type of computational brain. Turing seems quite surprised that in a sea of code and computers, Shannon envisioned the arts and culture as an integral part of the digital revolution – a digital DNA of sorts. What was dreamlike in 1943, is today a reality, as digital representation of all media, accounts for millions of “cultural things” and massive music collections. The early connections that Shannon made between the arts, information, and computing, intuit the future that we are experiencing today. This paper considers foundational aspects of the digital revolution, the current state, and the possible future. It examines how digital life is increasingly becoming part of real life for more and more people around the world, especially with respect to the arts, culture, and heritage. Computer science. Information theory. Digital aesthetics. Digital culture. GLAM. 1. INTRODUCTION 2016, Copeland et al.
    [Show full text]
  • Interval Temporal Logic
    Interval Temporal Logic Antonio Cau and Ben Moszkowski 2021-04-09 HTML version of the ITL home page Abstract Interval Temporal Logic (ITL) is a flexible notation for both propositional and first-order reasoning about periods of time found in descriptions of hardware and software systems. Unlike most temporal logics, ITL can handle both sequential and parallel composition and offers powerful and extensible specification and proof techniques for reasoning about properties involving safety, liveness and pro- jected time [134]. Timing constraints are expressible and furthermore most imperative programming constructs can be viewed as formulas in a slightly modified version of ITL [125]. Tempura provides an executable framework for developing and experimenting with suitable ITL specifications. In addi- tion, ITL and its mature executable subset Tempura [157] have been extensively used to specify the properties of real-time systems where the primitive circuits can directly be represented by a set of simple temporal formulae. In addition, Tempura has been applied to hardware simulation and other areas where timing is important. 1 Contents 1 Finite Interval Temporal Logic3 1.1 Syntax............................................3 1.2 Semantics..........................................3 1.3 Derived Constructs......................................5 1.4 Propositional proof system..................................7 1.5 First order proof system...................................7 2 Finite and Infinite Interval Temporal Logic8 2.1 Syntax............................................8
    [Show full text]
  • Oral History of Sir Antony Hoare
    Oral History of Sir Antony Hoare Interviewed by: Jonathan P. Bowen Recorded: September 8, 2006 Cambridge, United Kingdom CHM Reference number: X3698.2007 © 2006 Computer History Museum Oral History of Sir Antony Hoare Jonathan Bowen: Hello, Tony. Would you like to introduce yourself briefly? Sir Antony Hoare: I’m Tony Hoare, principal researcher at Microsoft Research Limited in Cambridge. Thank you for coming here to talk to me. Bowen: Thank you, Tony. I’m looking forward to our talk together. It would be interesting to know, first of all, how you grew up, and what your mother and father did. Hoare: My father was a colonial civil servant, and my mother was the daughter of a tea planter in Ceylon. She was called out to Ceylon to act as social secretary for my grandfather, and they met in Ceylon, married there, and I was born there. Bowen: And do you have any memories of Ceylon? Hoare: Oh, yes, I have quite vivid memories of going to school there. In those days it was still quite a wild place, and we used to go out to the country -- indeed into the forest -- to see animals and elephants and tigers. Had quite exciting adventures there in the school party. Bowen: And you had brothers and sisters? Hoare: I have two younger brothers and two younger sisters. My second brother was also born in Ceylon. Bowen: And you all got on well together? You were a happy family? Hoare: Oh, yes, in the end anyway. Bowen: Yes, like all families. Yes. Hoare: We still have the opportunity to meet quite frequently.
    [Show full text]
  • Issue 2005 2 June 2005
    , . Issue 2005-2 FACS June 2005 A FM E C A A C ~v1 L F (~ T ~J1 ETHODS C 1 BCS R S(:S(: M S Z A UM L I FM SI G E E E E E BCS The Newsletter of the Formal Aspects of 6 FACS Computing Science (FACS) Specialist Group ISSN 0950-1231 , " -40 , . FACS FACTS Iss ue 2005-2 June 2005 :~::;'::i(t::·::!:\,,: h\boJi EACS.FACTS .. '::':--'}U},;"";",::,:::: '}::::-::/:W::::::'" :,:':':t\i{\, '::;:=/';tt::-:· . , . EAG,sFACi,s[ I S$N:Q950~12311 U S ! h ~ Q~W~letter . of ·ihe BQ$ Specialist · (Sfoup 8h .·· FpribaIAsp~ Cts ·otCornputihg ·S§ience(FACS}; 'FACSFAGTS.• is· dfstributed in electronic form !ball FACS members. · .... A~from ';605 : FACS ?A hs ~ lii ' b~ ~clbl: g~~a foJ~\iinesayea 6 Mar c ti : • June; September and December. Submissions are always welcome .. p l g<!s~seetQe <3d¥~rt.. .or1 page2~fo r fU~herde! <! i ls of·yisil thenew§lg!ter .•.• areaOfthe FACS websile [ http: //www .bcs ~facs . org/newsletterr .. .. ............ .- ... -..... -,'- . Back issU~s . of FAGSFA GTS~re avai l ~ bl e t6 .downlda d frorTE The FACS FACTS Tea m . ..,., . Newsletted ::ditor . Paul B6ca [editor@fac;sfacts ci nfol Editori.al Team J61lathanBowerl,J udith Ca rlton, John Cooke; . Kevin Lano., Mike Siannett Colu rn nist~.i •. ' Din es Bj0rn er (The •~ ai l waY.oClm a i r1) ...•. Judith Carlton(Puzzles) " ....... ... Contribqtors .to t h.isJsSU€) ; Dines Bj0mer, Eerke Boiten, Jonathan . Bowen , Judith Ca ri ton, Roger Carsley, J o hn . D E! r ri 9~• . George E lef~er<;lki§ ; J ose ; Fiade i ro , Joh n F i tzg~ta l d, Carroll Morgan, Fiona Polack, F.X.
    [Show full text]
  • Manifest Domains:Analysis and Description
    Downloaded from orbit.dtu.dk on: Oct 02, 2021 Manifest domains:analysis and description Bjørner, Dines Published in: Formal Aspects of Computing Link to article, DOI: 10.1007/s00165-016-0385-z Publication date: 2017 Document Version Peer reviewed version Link back to DTU Orbit Citation (APA): Bjørner, D. (2017). Manifest domains:analysis and description. Formal Aspects of Computing, 29(2), 175-225. https://doi.org/10.1007/s00165-016-0385-z General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. 17 June 2016: 11:32 am: Accepted for publication in Formal Aspects of Computing Manifest Domains: Analysis and Description Dines Bjørner1 1 Fredsvej 11, DK-2840 Holte, Denmark. DTU, DK-2800 Kgs. Lyngby, Denmark. e-mail: [email protected], URL: www.imm.dtu.dk/˜dibj To the memory of Peter Lucas: 13 Jan. 1935 – 2 Feb. 2015 Abstract. We show that manifest domains, an understanding of which are a prerequisite for software requirements prescriptions, can be precisely described: narrated and formalised.
    [Show full text]