Show simple item record

dc.contributor.authorBenavides Navarro, Luis Daniel
dc.contributor.authorPimienta, Camilo
dc.contributor.authorSanabria, Mateo
dc.contributor.authorDíaz, Daniel
dc.contributor.authorGarzón, Wilmer
dc.contributor.authorMelo, Willson
dc.contributor.authorArboleda, Hugo
dc.description.abstractIn this paper, we propose REAL-T, a distributed event-based language with explicit support for time manipulation. The language introduces automata for operational time manipulation, causality constructs and Linear Temporal Logic for declarative time predicates, and a distributed-time aware event model. We have developed a compiler for the language and a dynamic run-time framework. To validate the proposal we study detection of complex patterns of security vulnerabilities in IoT scenarios.eng
dc.description.abstractEn este artículo, proponemos REAL-T, un lenguaje distribuido basado en eventos con soporte explícito para la manipulación del tiempo. El lenguaje introduce autómatas para la manipulación del tiempo operacional, construcciones de causalidad y lógica temporal lineal para predicados de tiempo declarativos, y un modelo de eventos de tiempo distribuido. Hemos desarrollado un compilador para el lenguaje y un marco de tiempo de ejecución dinámico. Para validar la propuesta estudiamos la detección de patrones complejos de vulnerabilidades de seguridad en escenarios de
dc.format.extent15 páginasspa
dc.publisherSpringer Naturespa
dc.relation.ispartofseriesCommunications in Computer and Information Science book series (CCIS, volume 885);
dc.titleREAL-T: Time Modularization in Reactive Distributed Applicationsspa
dc.typeCapítulo - Parte de Librospa
dc.relation.citationeditionCCIS, volume 885spa
dc.relation.ispartofbookAdvances in Computingspa
dc.relation.referencesBaier, C., Katoen, J.P.: Principles of Model Checking. MIT press, Cambridge (2008)spa
dc.relation.referencesBan, B., Grinovero, S.: JGroups (2011)spa
dc.relation.referencesBarringer, H., Goldberg, A., Havelund, K., Sen, K.: Program monitoring with LTL in EAGLE. In: 18th International Parallel and Distributed Processing Symposium 2004, April 2004spa
dc.relation.referencesBenavides Navarro, L.D., Barrera, A., Garcés, K., Arboleda, H.: Detecting and coordinating complex patterns of distributed events with KETAL. Electron. Notes Theor. Comput. Sci. 281, 127–141 (2011)spa
dc.relation.referencesBenavides Navarro, L.D., Douence, R., Südholt, M.: Debugging and testing middleware with aspect-based control-flow and causal patterns. In: Issarny, V., Schantz, R. (eds.) Middleware 2008. LNCS, vol. 5346, pp. 183–202. Springer, Heidelberg (2008).
dc.relation.referencesBenton, N., Cardelli, L., Fournet, C.: Modern concurrency abstractions for c#. ACM Trans. Program. Lang. Syst. 26(5), 769–804 (2004)spa
dc.relation.referencesBüchi, J.R.: Symposium on decision problems on a decision method in restricted second order arithmetic. Stud. Log. Found. Math. 44, 1–11 (1966)spa
dc.relation.referencesChen, F., Roşu, G.: Java-MOP: a monitoring oriented programming environment for Java. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol. 3440, pp. 546–550. Springer, Heidelberg (2005).
dc.relation.referencesChen, F., Roşu, G.: MOP: an efficient and generic runtime verification framework. In: ACM SIGPLAN Notices, vol. 42. ACM (2007)spa
dc.relation.referencesFisher, M.: An Introduction to Practical Formal Methods Using Temporal Logic. Wiley, Hoboken (2011)spa
dc.relation.referencesFuria, C.A., Mandrioli, D., Morzenti, A., Rossi, M.: Modeling time in computing: a taxonomy and a comparative survey. ACM Comput. Surv. 42(2), 1–59 (2010)spa
dc.relation.referencesGiannakopoulou, D., Lerda, F.: From states to transitions: improving translation of LTL formulae to Büchi automata. In: Peled, D.A., Vardi, M.Y. (eds.) FORTE 2002. LNCS, vol. 2529, pp. 308–326. Springer, Heidelberg (2002).
dc.relation.referencesHarel, D.: Statecharts: a visual formalism for complex systems. Sci. Comput. Program. 8(3), 231–274 (1987).
dc.relation.referencesHaydar, M., Boroday, S., Petrenko, A., Sahraoui, H.: Propositional scopes in linear temporal logic. In: Proceedings of the 5th International Conference on Novelles Technologies de la Repartition (NOTERE 2005) (2005)spa
dc.relation.referencesKiczales, G., et al.: Aspect-oriented programming. In: Akşit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220–242. Springer, Heidelberg (1997).spa
dc.relation.referencesKonur, S.: A survey on temporal logics for specifying and verifying real-time systems. Front. Comput. Sci. 7(3), 370–403 (2013)spa
dc.relation.referencesKröger, F., Merz, S.: Temporal Logic and State Systems. Springer, Berlin (2008).
dc.relation.referencesLamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558–565 (1978)spa
dc.relation.referencesLee, I., Lee, K.: The internet of things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)spa
dc.relation.referencesMattern, F., et al.: Virtual time and global states of distributed systems. Parallel Distrib. Algorithms 1(23), 215–226 (1989)spa
dc.relation.referencesMeredith, P.O., Jin, D., Griffith, D., Chen, F., Roşu, G.: An overview of the MOP runtime verification framework. Int. J. Softw. Tools Technol. Transf. 14(3), 249–289 (2012)spa
dc.relation.referencesMøller, A.: dk.brics.automaton – finite-state automata and regular expressions for Java (2017).
dc.relation.referencesNaldurg, P., Sen, K., Thati, P.: A temporal logic based framework for intrusion detection. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 359–376. Springer, Heidelberg (2004).
dc.relation.referencesOusterhout, J.: Why threads are a bad idea (for most purposes). In: Invited talk Given at USENIX Technical Conference (1996).
dc.relation.referencesPetri, C.A.: Fundamentals of a theory of asynchronous information flow. In: IFIP Congress (1962)spa
dc.relation.referencesvan Renesse, R., Birman, K.P., Maffeis, S.: Horus: a flexible group communication system. Commun. ACM 39(4), 76–83 (1996)spa
dc.relation.referencesRobiah, Y., Rahayu, S.S., Shahrin, S., Faizal, M., Zaki, M.M., Marliza, R.: New multi-step worm attack model. arXiv preprint arXiv:1001.3477 (2010)spa
dc.rights.creativecommonsAtribución 4.0 Internacional (CC BY 4.0)eng
dc.subject.proposalDistributed programmingeng
dc.subject.proposalEvent oriented programmingeng
dc.subject.proposalExplicit and implicit time managementeng

Files in this item


This item appears in the following Collection(s)

Show simple item record
Except where otherwise noted, this item's license is described as