A Secure Non-monotonic Soft Concurrent Constraint Language

Uloženo v:
Podrobná bibliografie
Název: A Secure Non-monotonic Soft Concurrent Constraint Language
Autoři: Bistarelli, S., Santini, F.
Zdroj: Fundamenta Informaticae.
Témata: monotonic functions, constraint satisfaction, programming languages, mathematical models, information theory
Popis: We present a fine-grained security model to enforce the access control on the shared constraint store in Concurrent Constraint Programming (CCP) languages. We show the model for a non-monotonic version of Soft CCP (SCCP), that is an extension of CCP where the constraints have a preference level associated with them. Crisp constraints can be modeled in the same framework as well. In the considered non-monotonic soft version (NmSCCP), it is also possible to remove constraints from the store. The language can be used for coordinating agents on a common store of information that represents the set of shared resources. In such scenarios, it is clearly important to enforce the integrity and confidentiality rights on the resources, in order, for instance, to hide part of the information to some agents, or to prevent an agent to consume too many resources. Finally, we present a bisimulation relation to check equivalence between two programs written in this language.
Druh dokumentu: Article
Jazyk: English
Přístupová URL adresa: http://yadda.icm.edu.pl/baztech/element/bwmeta1.element.baztech-d7c20808-6b00-49e6-8e2d-c402e64297e3
Přístupové číslo: edsbzt.bwmeta1.element.baztech.d7c20808.6b00.49e6.8e2d.c402e64297e3
Databáze: BazTech
Popis
Abstrakt:We present a fine-grained security model to enforce the access control on the shared constraint store in Concurrent Constraint Programming (CCP) languages. We show the model for a non-monotonic version of Soft CCP (SCCP), that is an extension of CCP where the constraints have a preference level associated with them. Crisp constraints can be modeled in the same framework as well. In the considered non-monotonic soft version (NmSCCP), it is also possible to remove constraints from the store. The language can be used for coordinating agents on a common store of information that represents the set of shared resources. In such scenarios, it is clearly important to enforce the integrity and confidentiality rights on the resources, in order, for instance, to hide part of the information to some agents, or to prevent an agent to consume too many resources. Finally, we present a bisimulation relation to check equivalence between two programs written in this language.