scholarly journals Optimal enforcement of (timed) properties with uncontrollable events

2017 ◽  
Vol 29 (1) ◽  
pp. 169-214 ◽  
Author(s):  
MATTHIEU RENARD ◽  
YLIÈS FALCONE ◽  
ANTOINE ROLLET ◽  
THIERRY JÉRON ◽  
HERVÉ MARCHAND

This paper deals with runtime enforcement of untimed and timed properties with uncontrollable events. Runtime enforcement consists in defining and using mechanisms that modify the executions of a running system to ensure their correctness with respect to a desired property. We introduce a framework that takes as input any regular (timed) property described by a deterministic automaton over an alphabet of events, with some of these events being uncontrollable. An uncontrollable event cannot be delayed nor intercepted by an enforcement mechanism. Enforcement mechanisms should satisfy important properties, namely soundness, compliance and optimality – meaning that enforcement mechanisms should output as soon as possible correct executions that are as close as possible to the input execution. We define the conditions for a property to be enforceable with uncontrollable events. Moreover, we synthesise sound, compliant and optimal descriptions of runtime enforcement mechanisms at two levels of abstraction to facilitate their design and implementation.

Author(s):  
Ricardo Neisse ◽  
Alexander Pretschner ◽  
Valentina Di Giacomo

Usage control policies specify restrictions on the handling of data after access has been granted. The authors present the design and implementation of a framework for enforcing usage control requirements and demonstrate its genericity by instantiating it to two different levels of abstraction, those of the operating system and an enterprise service bus. This framework consists of a policy language, an automatic conversion of policies into enforcement mechanisms, and technology implemented on the grounds of trusted computing technology that makes it possible to detect tampering with the infrastructure. The authors show how this framework can, among other things, be used to enforce separation-of-duty policies. The authors provide a performance analysis.


Author(s):  
Srinivas Pinisetty ◽  
Yliès Falcone ◽  
Thierry Jéron ◽  
Hervé Marchand ◽  
Antoine Rollet ◽  
...  

2014 ◽  
Vol 47 (2) ◽  
pp. 420-427 ◽  
Author(s):  
Srinivas Pinisetty ◽  
Yliès Falcone ◽  
Thierry Jéron ◽  
Hervé Marchand

2014 ◽  
Vol 45 (3) ◽  
pp. 381-422 ◽  
Author(s):  
Srinivas Pinisetty ◽  
Yliès Falcone ◽  
Thierry Jéron ◽  
Hervé Marchand ◽  
Antoine Rollet ◽  
...  

2017 ◽  
Vol 24 (4) ◽  
pp. 393-406
Author(s):  
Md. Shabiul Islam ◽  
M.S. Bhuyan ◽  
M. Salim Beg ◽  
Masuri Othman

This paper describes the design and implementation of a VHDL processor meant for performing 2D-Discrete Cosine Transform (DCT) to use in image compression applications. The design flow starts from the system specification to implementation on silicon and the entire process is carried out using an advanced workstation based design environment for digital signal processing. The software allows the bit-true analysis to ensure that the designed VLSI processor satisfies the required specifications. The bit-true analysis is performed on all levels of abstraction (behavior, VHDL etc.). The motivation behind the work is smaller size chip area, faster processing, reducing the cost of the chip


2012 ◽  
Vol 12 (5) ◽  
pp. 937-962 ◽  
Author(s):  
Rita Mutyaba

The International Criminal Court (ICC) has to rely on the cooperation of State Parties and non-party States in the arrest and surrender of accused persons who commit crimes within the court’s jurisdiction because it lacks an enforcement mechanism to apprehend those individuals. However, a State can refuse to cooperate with the Court based on competing requests for extradition of an accused, incompatibility of the cooperation request with international law, when the execution of the cooperation request is prohibited by national law, concern that the suspect’s human rights will be violated, the cooperation request has problems that may impede or prevent the State Party from executing the request; sovereignty claims. Notwithstanding these reasons, the cases before the Court show that the ICC has been largely successful in securing the arrest and surrender of accused persons. However, alternative enforcement mechanisms of cooperation requests should be considered as a means of apprehending suspects.


2016 ◽  
Vol 123 ◽  
pp. 2-41 ◽  
Author(s):  
Yliès Falcone ◽  
Thierry Jéron ◽  
Hervé Marchand ◽  
Srinivas Pinisetty

2000 ◽  
Vol 43 (1) ◽  
pp. 7-20 ◽  
Author(s):  
Kwong-Leung Tang ◽  
Jacqueline Tak-York Cheung

This article looks at the success and limitations of the UN Convention on the Elimination of all Forms of Discrimination Against Women. The authors argue that one must not rely wholly on international agreement to promote women's rights. The Convention has a weak enforcement mechanism, and there have been problems in the implementation process. Some recommendations which touch on its supervisory and enforcement mechanisms are made and implications for social work practice are discussed.


Sign in / Sign up

Export Citation Format

Share Document