Conflict Detection and Resolution in Access Control Policy Specifications

Size: px
Start display at page:

Download "Conflict Detection and Resolution in Access Control Policy Specifications"

Transcription

1 Conflict Detection and Resolution in Access Contol Policy Specifications Manuel Koch 1, Luigi V. Mancini 2, and Fancesco Paisi-Pesicce 2,3 1 Feie Univesität Belin, Belin (DE) mkoch@inf.fu-belin.de 2 Univ. di Roma La Sapienza, Rome (IT) lv.mancini@dsi.unioma1.it 3 Geoge Mason Univesity, Faifax VA (USA) paisi@dsi.unioma1.it, fpaisi@ise.gmu.edu Abstact. Gaph-based specification fomalisms fo Access Contol (AC) policies combine the advantages of an intuitive visual famewok with a igoous semantical foundation. A secuity policy famewok specifies a set of (constuctive) ules to build the system states and sets of positive and negative (declaative) constaints to specify wanted and unwanted substates. Models fo AC (e.g. ole-based, lattice-based o an access contol list) have been specified in this famewok elsewhee. Hee we addess the poblem of inconsistent policies within this famewok. Using fomal popeties of gaph tansfomations, we can systematically detect inconsistencies between constaints, between ules and between a ule and a constaint and lay the foundation fo thei esolutions. 1 Intoduction Access Contol (AC) deals with decisions involving the legitimacy ofequests to access files and esouces on the pat ofuses and pocesses. One ofthe main advantages ofsepaating the logical stuctue fom the implementation ofa system is the possibility to eason about its popeties. In [KMPP00,KMPP01a] we have poposed a fomalism based on gaphs and gaph tansfomations fo the specification ofac policies. This conceptual famewok, that we have used in [KMPP00,KMPP01a] to specify well-known secuity models such as olebased policies [San98], lattice-based access contol (LBAC) policies (examples ofmandatoy policies) [San93] and access contol lists (ACL) (examples ofdiscetionay policies) [SS94], allows fo the unifom compaison of these diffeent models, often specified in ad hoc languages and equiing ad hoc convesions to compae thei elative stength and weaknesses. Ou gaph-based specification fomalism fo AC policies combines the advantages ofan intuitive visual famewok with a igo and pecision ofa semantics patially suppoted by the EC unde TMR Netwok GETGRATS and unde Espit WG APPLIGRAPH, and by the Italian MURST. M. Nielsen and U. Engbeg (Eds.): Fossacs 2002, LNCS 2303, pp , c Spinge-Velag Belin Heidelbeg 2002

2 224 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce founded on categoy theoy. In addition, tools developed fo geneic gaph tansfomation engines can be adapted to o can fom the basis fo applications that can assist in the development ofa specific policy. We use in this pape examples fom the LBAC and the ACL models to illustate the diffeent concepts, with no petense ofgiving complete o unique solutions by these examples. The main goal ofthis pape is to pesent some basic popeties ofa fomal model fo AC policies based on gaphs and gaph tansfomations and to addess the poblem ofdetecting and esolving conflicts in a categoical setting. A system state is epesented by a gaph and gaph tansfomation ules descibe how a system state evolves. The specification ( famewok ) of an AC policy contains also declaative infomation ( invaiants ) on what a system gaph must contain (positive) and what it cannot contain (negative). A cucial popety ofa famewok is that it specifies a coheent policy, that is one without intenal contadictions. Fomal esults ae pesented to help in ecognizing when the positive and the negative constaints ofa famewok cannot be simultaneously satisfied, when two ules, possibly coming fom peviously distinct subfamewoks, do (patly) the same things but unde diffeent conditions, and when the application ofa ule poduces a system gaph that violates one ofthe constaints (afte one o the othe has been added to a famewok duing the evolution ofa policy). The solutions poposed on a fomal level can be made pat ofa methodology and incopoated into an Access Contol Policy Assistant. The pape is oganized as follows: the next section eviews the basic notations of gaph tansfomations and ecalls the fomal famewok to specify AC policies [KMPP01a]; Sect.3 discusses the notion ofa conflict ofconstaints, Sect.4 intoduces conflicts between ules and mentions stategies to esolve conflicts; Sect.5 discusses how to modify a ule so that its application does not contadict one ofthe constaints; the last section mentions elated and futue wok. 2 Gaph-Based Secuity Policy Famewoks We assume that the eade is familia with the basic notation fo gaph tansfomations as in [Roz97] and in [KMPP01a]. Pats of a LBAC model ae used thoughout the section to illustate the explanations by examples. Gaphs G =(G V,G E,s G,t G,l G ) cay labels taken fom a set X of vaiables and a set C of constants. A path ofunspecified length between nodes a and b is indicated by an edge a b as an abbeviation fo a set containing all possible paths fom a to b though the gaph. A total mophism f : G H is a pai (f V : G V H V, f E : G E H E ) oftotal mappings that espect the gaph stuctue and may eplace a vaiable with othe vaiables o constants. A patial gaph mophism f : G His a total gaph mophism f : dom(f) H fom a subgaph dom(f) G to H. Gaphs can be typed by defining a total mophism t G : G TG to a fixed type gaph TG that epesents the type infomation in a gaph tansfomation system [CELP96] and specifies the node and edge types which may occu in the

3 Conflict Detection and Resolution in Access Contol Policy Specifications 225 U P O val Fig. 1. The type gaph fo the LBAC model. instance gaphs modeling system states. Fo example, the type gaph in Figue 1 shows the possible types fo the LBAC gaph model. The node U is the type ofnodes epesenting uses, the node O the objects, the node val the actual infomation of objects and the node P the pocesses that un on behalfofuses. The node with its loop epesents a whole secuity lattice, and thee is an edge fom secuity level 1 to 2 if 1 > 2. The attachment ofsecuity levels to objects, uses and pocesses is modeled by an edge to a secuity level ofthe secuity lattice. The typing mophism t G maps a node with label Tx to the type T, and mophisms must peseve the typing. A ule p : consists ofa name p, and a label peseving injective mophism : L R. The left-hand side L descibes the elements a gaph must contain fo p to be applicable. The patial mophism is undefined on nodes/edges that ae intended to be deleted, defined on nodes/edges that ae intended to be peseved. Nodes and edges of R, ight-hand side, without a pe-image ae newly ceated. Note that the actual deletions/additions ae pefomed on the gaphs to which the ule is applied. The application ofa ule p : to a gaph G equies a total gaph mophism m : L G, called match, and the diect deivation G p,m H is given by the pushout of and m in the categoy ofgaphs typed ove TG [EHK + 97]. Example 1 (LBAC gaph ules). Figue 2 shows the ules fo the LBAC policy. The labels fo the nodes (, P x, x, y,...) ofthe ules ae vaiables. x x * new pocess * y y delete pocess new object Sx x Sx x delete object valx Fig. 2. Gaph ules fo the LBAC policy. The ule new object ceates a new object connected to a node valx (the initial value ofthe object) and assigned to the secuity level x. The label x is geneic and is substituted by the actual secuity level ofthe pocess

4 226 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce when the ule is applied. The ule delete object fo the deletion of objects is epesented by evesing the patial mophism ofthe ule new object. The ule new pocess ceates a pocess on behalfofa use. The new pocess is attached to a secuity level y that is no highe in the secuity lattice gaph than the secuity level x ofthe use. This equiement is specified by the path fom x to y. Pocesses ae emoved by the ule delete pocess. Fo the specification ofac policies by gaph tansfomations, negative application conditions fo ules ae needed. A negative application condition (NAC) fo a ule p : L Rconsists ofa set A(p) ofpais (L, N), whee the gaph L is a subgaph of N. The pat N \ L epesents a stuctue that must not occu in a gaph G fo the ule to be applicable. In the figues, we epesent (L, N) with N, whee the subgaph L is dawn with solid and N \ L with dashed lines. A ule p : L Rwith a NAC A(p) is applicable to G if L occus in G via m and it is not possible to extend m to N fo each (L, N) ina(p). Example 2 (NAC). Figue 3 shows the ules fo modifying the secuity lattice. New secuity levels can be inseted above an existing secuity level (ule new level 1), below (new level 2) o between existing levels (new level 3). (Notice that the lattice stuctue is not peseved by these ules.) The ule delete level emoves a secuity level. Since uses, pocesses and objects need a secuity level, secuity levels cannot be emoved ifa use, pocess o object possesses this level. Thus, the NAC ofthe ule delete level, whose left-hand side contains the node x, has thee pais (L, N): the fist one pevents the deletion ofsecuity levels that ae assigned to a pocess, the second one concens uses and the last one objects. Only ifthe NAC is satisfied, a secuity level can be emoved. x new level 1 y x x new level 2 x y x y new level 3 x y z x x x delete level Fig. 3. LBAC ules fo modifying the secuity lattice. Negative application conditions ae a fom of constaint on the applicability ofa ule. Constaints can be defined independently ofules. Definition 1 (Constaints). A constaint (positive o negative) is given by a total mophism c : X Y.A total mophism p : X G satisfies a positive (negative) constaint c if thee exists (does not exist) a total mophism q : Y G such that X c Y q G = X p G. A gaph G satisfies a constaint c if each total mophism p : X G satisfies c. A gaph G vacuously satisfies c if thee is no total mophism p : X G; G popely satisfies c othewise.

5 Conflict Detection and Resolution in Access Contol Policy Specifications 227 Example 3 (Constaints fo LBAC). Figue 4 shows a positive and a negative constaint fo the LBAC model. The mophism fo the negative constaint is the identity on the gaph shown (to simplify the pesentation, we depict only the gaph). The constaints equie that objects always have one (the positive constaint) and only one (negative constaint) secuity level. positive constaint: O negative constaint: O O Fig. 4. Positive and negative constaints fo LBAC. We now eview the specification ofac policies based on gaph tansfomations [KMPP00]. The famewok is called secuity policy famewok and consists ofa type gaph that povides the type infomation ofthe AC policy, a set ofules (specifying the policy ules) that geneate the gaphs epesenting the states accepted by the AC policy, a set of negative constaints to specify gaphs that shall not be contained in any system gaph and a set of positive constaints to specify gaphs that must be explicitly constucted as pats ofa system gaph. Definition 2 (Secuity Policy Famewok). A secuity policy famewok, o just famewok, is a tuple SP =(TG,(P, ules P ), P os, Neg), whee TG is a type gaph, P a set of ule names, ules P : P Rule(TG) a total mapping fom names to TG typed ules, Pos is a set of positive constaints, and Neg is a set of negative constaints. The gaphs constucted by the ules ofa famewok epesent the system states possible within the policy model. These gaphs ae called system gaphs. Definition 3 (Coheence). A secuity policy famewok is coheent if all system gaphs satisfy the constaints in Pos and Neg. Integation is concened with the meging ofac policies and consists oftwo levels, a syntactical level, i.e. a mege ofthe secuity policy famewoks, and a semantical level, i.e. the mege ofthe system gaphs epesenting the state at mege time. The integation oftwo AC policies on the syntactical level is a pushout ofthe famewoks in the categoy SP. It has been shown in [KMPP01b] that the categoy SP of famewoks and famewok mophisms is closed unde finite colimit constuctions. An impotant aspect ofintegation is the pesevation ofcoheence: iftwo famewoks ae coheent, is thei gluing also coheent? Geneally, this is not the case. Conflicts also aise when modifying a famewok by adding/emoving a ule o by adding/emoving a positive/negative constaint. In the next thee sections, the poblems ofconflicting constaints, conflicting ules and conflicts between a ule and a constaint ae addessed.

6 228 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce 3 Constaint-Constaint Conflict One way to detemine whethe a famewok is contadictoy is to analyze constaints in pais. Definition 4 (Conflict ofconstaints). Given constaints c i : X i Y i fo i =1, 2, c 1 is in conflict with c 2 iff thee exist mophisms f X : X 1 X 2 and f Y : Y 1 Y 2 such that f Y c 1 = c 2 f X and f X does not satisfy c 1.The conflict is stict if the diagam is a pushout. X 1 c 1 Y 1 f X f Y X 2 c 2 Y 2 When two constaints contain edundant estictions, the conflict is hamless. Poposition 1 (Hamless Conflicts). Let c 1 be in conflict with c 2 and G satisfy c 1.Then G satisfies c 2 wheneve eithe c 1,c 2 Neg o c 1,c 2 Pos and c 1 is in stict conflict with c 2. When the two constaints in conflict ae one positive and one negative, then any gaph satisfying one cannot popely satisfy the othe one. Poposition 2 (Citical Conflicts). Let c 1 be in conflict with c 2 and G popely satisfy c 2.If eithe c 1 Pos, c 2 Neg and the conflict is stict, o c 1 Neg, then G does not popely satisfy c 1. Citical conflicts between constaints can be esolved by emoving o weakening one ofthe constaints by adding a condition. Definition 5 (Conditional Constaint). A positive (negative) conditional constaint (x, c) consists of a negative constaint x : X N, called constaint condition, and a positive (negative) constaint c : X Y.A total mophism p : X G satisfies (x, c) iff wheneve p satisfies x, p satisfies c.a gaph G satisfies (x, c) iff each total mophism p:x G satisfies (x, c). A conditional constaint solves the conflict of c 1 with c 2 (via f X and f Y )by intoducing a constaint condition fo c 1 that equies the satisfaction of c 1 if and only if c 2 is vacuously satisfied. Poposition 3. Let c 1 : X 1 Y 1 be in conflict with c 2 : X 2 Y 2 via f X and f Y, then G satisfies f X if and only if G vacuously satisfies c 2. Definition 6 (Weak Constaint). If c 1 is in conflict with c 2 via f X and f Y, then the weak constaint c 1 (c 2 ) fo c 1 with espect to c 2 is the conditional constaint c 1 (c 2 )=(f X,c 1 ).

7 Conflict Detection and Resolution in Access Contol Policy Specifications 229 Poposition 4. If c 1 is in conflict with c 2, then the weak constaint c 1 (c 2 ) is not in conflict with c 2. Weakening a constaint is one stategy to solve conflicts. A geneal discussion ofstategies is outlined in [KMPP01b]. It is woth stessing that detemining a conflict between constaints can be pefomed statically and automatically. 4 Rule-Rule Conflicts Two ules ae in a potential-conflict (p-conflict) ifthey do (patly) the same things but unde diffeent conditions. A conflict occus ifp-conflicting ules can be applied to a common gaph. Ifthe choice fo one ule in a conflict may pevent the applicability ofthe othe ule, the conflict is called citical, othewise it is a choice conflict. The LBAC ule new object and the access contol list (ACL) ule ceate object in Figue 5 ae in p-conflict, since both ules ceate a new object node. An ACL (such as the one in UNIX) is a stuctue that stoes the access ights to an object with the object itself. The ule ceate object specifies the ceation ofan object by a pocess that uns on behalfofa use. Initially, thee ae no access ights to the new object and the use becomes the owne ofthe new object 1. LBAC ACL x new object x ceate object Vx Fig. 5. The LBAC ule new object and the ACL ule ceate object. The ule new object ceates an object with a secuity level, the ule ceate object an object without one. Which ule shall be applied to intoduce a new object in the system? A static analysis ofthe ules can detect the citical and the choice conflicts befoe un-time so that ules can be changed to avoid conflicts. Definition 7 (p-conflict, Conflict Pai, Conflict). Rules p i : L i i Ri, i = 1,2, with NAC A(p i ) ae in p-conflict if thee is a common non-empty subule 2 fo p 1 and p 2.Each pai of matches (m 1 : L 1 G,m 2 : L 2 G) is a conflict pai fo p 1 and p 2.The ules p 1 and p 2 ae in conflict, if they ae in p-conflict and thee is a conflict pai fo p 1 and p 2.Othewise, they ae called conflict-fee. Geneally, thee exist an infinite numbe ofmatches fo one ule, so the set ofmatches must be educed fo a static analysis. To detect a ule conflict, it is sufficient to conside the left-hand sides of the ules. 1 The complete specification of the famewok fo the ACL is given in [KMPP01a]. 2 A ule p 0 : L 0 R0 0 is a subule of ule p : L Rif thee ae total mophisms f L : L 0 L and f R : R 0 R with f L = f R 0.

8 230 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce Definition 8 (Set ofconflict Pais). The set CP(p 1,p 2 ) ofconflict pais fo ules (p i : L i i Ri,A(p i )), i =1, 2, consists of all pais of matches (m 1 : L 1 G, m 2 : L 2 G), whee m 1 and m 2 ae jointly sujective. The set ofconflict pais fo two ules in a p-conflict consists ofa finite numbe ofpais since the left-hand side ofa ule is a finite gaph. Poposition 5 (Conflict Feeness). Let CP(p 1,p 2 ) be the set of conflict pais fo the p-conflicting ules (p 1 : L 1 1 R1,A(p 1 )) and (p 2 : L 2 2 R2,A(p 2 )). Then, the ules p 1 and p 2 ae conflict-fee if and only if CP(p 1,p 2 ) is empty. The set ofconflict pais fo ules may be split into choice and conflict citical pais: in the latte, afte applying p 1 at match m 1, the ule p 2 is no longe applicable at m 2 o vice vesa, while in the fome, the ode does not matte and afte applying p 1 at m 1, p 2 is still applicable and vice vesa. Citical and choice conflict pais ae detected by the concept of paallel independence [EHK + 97]. Definition 9 (Paallel Independence). Given ules (p i : L i i Ri,A(p i )), i =1, 2, the deivations G p1 H 1 and G p2 H 2 ae paallel independent if 2 m 1 is total and satisfies A(p 1 ) and 1 m 2 is total and satisfies A(p 2 ).Othewise, the deivations ae called paallel dependent. R 1 H 1 1 L L 2 m 1 m 2 G 2 R 2 H2 In the case ofpaallel independence, the application ofp 1 at m 1 and the delayed application of p 2 at 1 m 2 esults in the same gaph (up to isomophism) as the application of p 2 at m 2 and the delayed application of p 1 at 2 m 1. Definition 10 (Choice and Citical Conflict Pai). A conflict pai (m 1,m 2 ) fo ules p 1 and p 2 is a choice conflict if the deivations G p1,m1 H 1 and G p2,m2 H 2 ae paallel independent.it is a citical conflict othewise. We popose two stategies to solve ule conflicts. In the fist stategy, we take one ule p 1 as majo ule, and one p 2 as mino ule. Fo a conflict pai (m 1,m 2 ), p 2 is changed by adding a NAC that fobids its application at match m 2 if p 1 can be applied at m 1. The second stategy integates the ules into one ule. Definition 11 (Weak Condition, Weak Rule). Given a conflict pai (m 1,m 2 ) fo ules (p i : L i i Ri,A(p i )), i =1, 2, the weak condition fo p 2 w..t. (m 1,m 2 ), denoted by WC(p 1,p 2, (m 1,m 2 )), is given by the NAC (L 2,N),

9 Conflict Detection and Resolution in Access Contol Policy Specifications 231 whee the oute diagam is a pullback and the diagam (1) is a pushout diagam. S L 1 (1) N n L2 m 1 m 2 G The ule p 2 with this added NAC is called weak ule. The weak condition fo the mino ule ensues that the majo and the mino ule cannot be both applied to a common system gaph at match m 1 and m 2. Example 4 (weak ule). The top offigue 6 shows the p-conflicting ACL ule ceate object and the LBAC ule new object. Conflict pais fo these ules ae the inclusions (in 1 : L 1 L 1 L 2,in 2 : L 2 L 1 L 2 ) ofthe left-hand sides into thei disjoint union, and the inclusions (in 1 : L 1 G, in 2 : L 2 G) ofthe left-hand sides into the gaph G (the gluing ofthe left-hand sides ove the node ). Figue 6 shows the weak ules with espect to the second conflict pai. The weak ule fo ceate object w..t. new object has a NAC that fobids the application when thee is a secuity level fo the pocess. Theefoe, the weak ule fo ceate object is only applicable to pocesses ceated with the ACL ule and without a countepat in the LBAC model. The weak ule fo new object w..t. ceate object has a NAC that fobids the pesence of a use connected to the pocess. Since each use is connected to a pocess, the ule is not applicable to pocesses ceated by ACL ules. LBAC x new object x ACL ceate object Vx weak "new object" w..t. "ceate object" weak "ceate object" w..t. "new object" x x x Vx Fig. 6. The weak ules fo new object and ceate object. Theoem 1 (Weak Rule is Conflict-fee). Given the set of conflict pais CP(p 1,p 2 ) fo p 1 and p 2, the ule p 1 and the ule p 2, extended by WC(p 1,p 2, (m 1,m 2 )) fo each (m 1,m 2 ) CP(p 1,p 2 ), ae conflict-fee.

10 232 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce The second solution fo solving conflicts between ules is the amalgamation ofthe p-conflicting ules ove thei common subule. Definition 12 (Integated Rule). Let (p i : L i i Ri,A(p i )) fo i =1, 2 be p-conflicting ules and p 0 : L 0 R0 0 with f Li : L 0 L i and f Ri : R 0 R i thei common subule (cf.figue 7). The integated ule is given by (p : L R,A(p)), whee diagam (1) is the pushout of f L1 and f L2, diagam (2) is the pushout of f R1 and f R2 and is the univesal pushout mophism. The set A(p) contains a NAC n : L N fo each pai of NACs n 1 : L 1 N 1 A(p 1 ) and n 2 : L 2 N 2 A(p 2 ), whee N is the pushout of n 1 f L1 and n 2 f L2 and n is the univesal pushout mophism. L 0 0 R 0 N 1 N 2 L 1 (1) L 2 R 1 (2) R 2 N n L R Fig. 7. Amalgamation of p-conflicting ules. Example 5. Figue 8 shows the integated ule fo the ules ceate object and new object. Thei common subule is maked in the ules and contains the pocess node in the left-hand side and the nodes and in the ighthand side. The integated ule ceates an object that belongs to a use, as well as a pocess, and that caies a secuity level. LBAC ACL x new object x ceate object Vx integated ule x x Vx Fig. 8. Amalgamation of p-conflicting ules ceate object and new object.

11 Conflict Detection and Resolution in Access Contol Policy Specifications Rule-Constaint Conflict Rules can be classified into deleting ules that only delete gaph elements, without adding anything (i.e., dom() =R L) and expanding ules that only add gaph elements, but do not delete anything (i.e., dom() = L R). A conflict between a ule and a constaint occus when the application of the ule poduces a gaph which does not satisfy the constaint. The potential fo conflict can be checked statically diectly with the ule and the constaint without knowledge ofspecific gaphs and deivations. A deleting ule p and a positive constaint c ae in conflict ifthe added pat equied by c (i.e., Y \c(x)) ovelaps with what p emoves (i.e., L \ dom()). Similaly, an expanding ule p conflicts with a negative constaint c ifwhat is added by p (i.e., R\(L)) ovelaps with something fobidden by c (i.e., Y \ c(x)). Definition 13 (Rule-Constaint Conflicts). Let p : L Rbe an expanding ule and c : X Y a constaint, then p and c ae in conflict if thee exists a nonempty gaph S and injective total mophisms s 1 : S R and s 2 : S X so that s 1 (S) (R \ (L)). Let p : L Rbe a deleting ule and c : X Y a positive constaint, then p and c ae in conflict if thee exists a nonempty gaph S and injective total mophisms s 1 : S L and s 2 : S Y so that s 1 (S) (L \ dom()) and s 2 (S) (Y \ c(x)). Conflicts between ules p and constaints c : X Y can be esolved (in favo of the constaint) by adding NACs to the ules p. Fo the conflict between expanding ules and negative constaints, the NACs pevent the ule fom completing the conclusion ofthe constaint. Fo the conflict between expanding ules and positive constaints, the NACs pevent the ule fom completing the condition X, and fo the conflict between deleting ules and positive constaints, the NACs pevent the ule fom destoying the conclusion Y. Definition 14 (Reduction). Given a ule p : L Rand a nonempty ovelap S of R and the condition X of the constaint c : X Y. s 1 L R S s 2 X c N h C Y Let C be the pushout object of s 1 : S R and c s 2 : S Y in Gaph, and let C 1,h N be the deivation with the invese ule p 1 : R 1 L at match h. The eduction p(c) ofp by c consists of the patial mophism L Rand the set A(p, c) ={(L, N) C ( 1,h) N, C = R + S Y fo some ovelap S } of NACs. The constuction consides abitay ules and constaints, i.e., it is not esticted to deleting o expanding ules, espectively. This constuction educes to the one in [HW95] ifthe constaint c : X Y is the identity mophism.

12 234 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce Theoem 2 (Reduction peseves Satisfaction). Let p : L Rbe a ule and G a gaph that satisfies the constaint c : X Y. 1.If c is negative, p is expanding, p(c) the eduction of p by c and G p(c) H is a deivation with p(c), then H satisfies c. 2.If c is positive, p is expanding, p(id X ) the eduction of p by id X : X X, and G p(id X ) H a deivation with p(id X ), then H satisfies c. 3.If c is positive, p is deleting, p(c) =(, A(id L,c)), and G p(c) H, then H satisfies c. Conside the negative constaint c(succ) in Figue 9 fobidding two (o moe) successo levels, and the (expanding) ule new level 2 in Figue 3 that may poduce an inconsistent state by adding a successo level. We descibe now, in algoithmic fom, the constuction of the eduction of new level 2 by c(succ): Fig. 9. Negative constaint c(succ) fobidding moe than two successo secuity levels. Step 1: Constuction ofall possible nonempty ovelaps ofr ofthe ule new level 2 and the gaph of c(succ). Figue 10 shows the nonempty ovelaps S1, S2 and S3 with mophisms s 1 and s 2. The emaining ovelaps of R and X use the same subgaphs S1,S2,S3, but diffeent mophisms s 1 and s 2. S 1 S 2 S3 R X R X R x y x y x y X Fig. 10. Nonempty ovelaps between new level 2 and c(succ). Step 2: Fo each ovelap S in step 1, the pushout C ofthe mophisms S R and S X is constucted. The application condition (L, N) is constucted by applying the invese ule of new level 2 at match R C esulting in gaph N. The invese ule of new level 2 deletes a secuity level. Figue 11 shows the pais (L, N) fo the thee ovelaps in Figue 10. The constuction in Definition 14 may geneate edundant application conditions. In fact, if we assume that G aleady satisfies the constaint c, some application conditions ae automatically satisfied. This coesponds to the case

13 Conflict Detection and Resolution in Access Contol Policy Specifications 235 NAC 1 NAC 2 NAC 3 Fig. 11. NACs constucted fom the ovelaps. whee the ovelap S R can be decomposed into S L R. The gaph N geneated fom such ovelap can be eliminated diectly fom Definition 14 by equiing only ovelaps S fo which s 1 (S) (R \ (L)). In this manne, the application condition NAC 1 offigue 11 can be emoved. Anothe fom of edundancy stems fom the fact that, if S 1 with mophisms s 1 1 and s 1 2 and S 2 with mophisms s 2 1 and s 2 2 ae ovelaps and, say, S 1 S 2, s 1 1 S1 = s 2 1, s 1 2 S1 = s 2 2 then C 2 = R + S2 Y C 1 = R + S1 Y and thus N 2 N 1. Hence, ifa match L G satisfies (L, N 2 ), then it also satisfies (L, N 1 ) and the application condition (L, N 1 ) can be emoved fom A(p, c). Fo example, the ovelap S 1 is included into the ovelap S 3 (cf. Figue 10). Theefoe, NAC3 NAC1 (cf. Figue 11) and we can emove NAC1. The solution ofconflicts between expanding ules and negative constaints and ofconflicts between deleting ules and positive constaints is a easonable eduction ofthe numbe ofsystem gaphs which the ules can poduce. The solution fo conflicts between expanding ules and positive constaints, howeve, is not vey satisfactoy, since it educes moe than necessay the numbe of system gaphs that can be geneated. Anothe solution is a constuction which extends the ight-hand side ofa ule so that the ule ceates the entie conclusion Y ofa constaint c : X Y and not only pats ofit. Definition 15 (Completing Rule). The completing ule fo an expanding ule p : L R and a positive constaint c is defined by p c (c) =v i h i, whee L R s i 1 S i s i 2 X p c (c) R v i h i C i y i Y c Ω = {R si 1 s S i 2 i X} is the set of all nonempty ovelaps of R and X so that s i 1(S i ) (R \ (L)), fo each S i Ω, (C i,h i,y i ) is the pushout of s i 1 and c s i 2 in Gaph, (R,v i : C i R ) is the pushout of the mophisms h i : R C i in Gaph. The completing ule fo the ACL ule ceate object and the positive constaint equiing a value fo each object is shown in Figue 12. Lemma 1. If p c (c) :L R is the completing ule fo p, c, then R satisfies c.

14 236 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce L R N n * s2 s1 s1 S X s2 Oy c Y Oy val R u y val Fig. 12. Constuction of the completing ule. The completing ule, howeve, does not peseve consistency fo each positive constaint. Ifwe estict positive constaints to single (X contains at most one node) o edge-eticted (fo each edge s e t (Y \ c(x)), s, t (Y \ c(x))), the constuction esults always in a consistence peseving ule. Poposition 6. If c is a single o edge-eticted positive constaint, the completing ule p c (c) fo a ule p is consistent with espect to c. The constuction ofthe completing ule could be genealized to abitay constaints by using set nodes: a set node in the left-hand side of a ule matches all occuences ofthis node in a gaph and the ule is applied to all the occuences. Anothe possibility to solve conflicts between positive constaints and expanding ules p is to tansfom the constaint X Y into a ule and equie that this ule is applied (afte the application of p) as long as thee ae occuences of X not visited in H. The new ule is just the constaint X Y with negative application condition (X, Y ) to avoid its application epeatedly on the same pat of H. It is neccessay to add contol on the famewok to ensue that this new ule is applied as long as possible. Contol can be intoduced eithe by using ule expessions [GRPPS00] o tansfomation units [EKMR99] as an encapsulation mechanism used in a way simila to pocedue calls. 6 Concluding Remaks In a gaph-based appoach to the specification ofac policies, states ae epesented by gaphs and thei evolution by gaph tansfomations. A policy is fomalized by fou components: a type gaph, positive and negative constaints (a declaative way ofdescibing what is wanted and what is fobidden) and a

15 Conflict Detection and Resolution in Access Contol Policy Specifications 237 set ofules (an opeational way ofdescibing what can be constucted). An impotant poblem addessed hee is how to deal with inconsistencies caused by conflicts between two ofthe constaints, two ofthe ules o between a ule and a constaint. Often such poblems aise when tying to pedict the behavio of an AC policy obtained by integating two sepaate coheent policies [KMPP01a]. The conflict between a ule ofone policy and a simple constaint ofthe othe policy has been addessed in pat elsewhee [KMPP00], whee it is also shown the adequacy ofthis famewok to epesent a Role-based Access Contol policy. Hee we have tackled the poblem ofconflicts by making effective use ofthe gaph based fomalism. Conflicts ae detected and esolved statically by using standad fomal tools typical of this gaph based fomalism. In the pocess, we have intoduced the notions ofconditional constaint and ofweakening ofa ule. A tool, based on a geneic gaph tansfomation engine, is unde development to assist in the systematic detection and esolution ofconflicts and in the stepwise modification ofan evolving policy while maintaining its coheence. Refeences CELP96. A. Coadini, H. Ehig, M. Löwe, and J. Padbeg. The categoy of typed gaph gammas and thei adjunction with categoies of deivations. In 5th Int. Wokshop on Gaph Gammas and thei Application to Compute Science, numbe 1073 in LNCS, pages Spinge, EHK H. Ehig, R. Heckel, M. Koff, M. Löwe, L. Ribeio, A. Wagne, and A. Coadini. Handbook of Gaph Gammas and Computing by Gaph Tansfomations. Vol. I: Foundations, chapte Algebaic Appoaches to Gaph Tansfomation Pat II: Single Pushout Appoach and Compaison with Double Pushout Appoach. In Rozenbeg [Roz97], EKMR99. H. Ehig, H.-J. Keowski, U. Montanai, and G. Rozenbeg, editos. Handbook of Gaph Gammas and Computing by Gaph Tansfomations. Vol. III: Concuency, Paallelism, and Distibution. Wold Scientific, GRPPS00. M. Goße-Rhode, F. Paisi-Pesicce, and M. Simeoni. Refinements of Gaph Tansfomation Systems via Rule Expessions. In H. Ehig, G. Engels, H.-J. Keowski, and G. Rozenbeg, editos, Poc. of TAGT 98, numbe 1764 in Lect. Notes in Comp. Sci., pages Spinge, HW95. R. Heckel and A. Wagne. Ensuing consistency of conditional gaph gammas - a constuctive appoach. In Poc. SEGRAGRA 95 Gaph Rewiting and Computation, numbe 2. Electonic Notes of TCS, KMPP00. M. Koch, L.V. Mancini, and F. Paisi-Pesicce. A Fomal Model fo Role-Based Access Contol using Gaph Tansfomation. In F.Cuppens, Y.Deswate, D.Gollmann, and M.Waidne, editos, Poc. of the 6th Euopean Symposium on Reseach in Compute Secuity (ESORICS 2000), numbe 1895 in Lect. Notes in Comp. Sci., pages Spinge, KMPP01a. M. Koch, L. V. Mancini, and F. Paisi-Pesicce. On the Specification and Evolution of Access Contol Policies. In S. Osbone, edito, Poc. 6th ACM Symp. on Access Contol Models and Technologies, pages ACM, May 2001.

16 238 Manuel Koch, Luigi V. Mancini, and Fancesco Paisi-Pesicce KMPP01b. M. Koch, L.V. Mancini, and F. Paisi-Pesicce. Foundations fo a gaph-based appoach to the Specification of Access Contol Policies. In F.Honsell and M.Miculan, editos, Poc. of Foundations of Softwae Science and Computation Stuctues (FoSSaCS 2001), numbe 2030 in Lect. Notes in Comp. Sci., pages Spinge, Roz97. G. Rozenbeg, edito. Handbook of Gaph Gammas and Computing by Gaph Tansfomations. Vol. I: Foundations. Wold Scientific, San93. R. S. Sandhu. Lattice-based access contol models. IEEE Compute, 26(11):9 19, San98. R. S. Sandhu. Role-Based Access Contol. In Advances in Computes, volume 46. Academic Pess, SS94. R.S. Sandhu and P. Samaati. Access Contol: Pinciples and Pactice. IEEE Communication Magazine, pages 40 48, 1994.

Sesqui-pushout rewriting

Sesqui-pushout rewriting Sesqui-pushout ewiting Andea Coadini Dipatimento di Infomatica, Pisa, Italy IFIP WG 1.3 - La Roche en Adennes, June 6, 2006. Joint wok with Tobias Heindel Fank Hemann Babaa König Univesität Stuttgat, Gemany

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

Maintaining Consistency in Layered Architectures of Mobile Ad-Hoc Networks

Maintaining Consistency in Layered Architectures of Mobile Ad-Hoc Networks Maintaining Consistency in Layeed Achitectues of Mobile Ad-Hoc Netwoks Julia Padbeg, Kathin Hoffmann, Hatmut Ehig, Tony Modica, Enico Biemann, and Claudia Emel Institute fo Softwae Technology and Theoetical

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Pushdown Automata (PDAs)

Pushdown Automata (PDAs) CHAPTER 2 Context-Fee Languages Contents Context-Fee Gammas definitions, examples, designing, ambiguity, Chomsky nomal fom Pushdown Automata definitions, examples, euivalence with context-fee gammas Non-Context-Fee

More information

Physics 2B Chapter 22 Notes - Magnetic Field Spring 2018

Physics 2B Chapter 22 Notes - Magnetic Field Spring 2018 Physics B Chapte Notes - Magnetic Field Sping 018 Magnetic Field fom a Long Staight Cuent-Caying Wie In Chapte 11 we looked at Isaac Newton s Law of Gavitation, which established that a gavitational field

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

Graph-based specification of access control policies

Graph-based specification of access control policies Journal of Computer and System Sciences 71 (2005) 1 33 www.elsevier.com/locate/jcss Graph-based specification of access control policies Manuel Koch a, L.V. Mancini b, Francesco Parisi-Presicce c, a Freie

More information

Classical Worm algorithms (WA)

Classical Worm algorithms (WA) Classical Wom algoithms (WA) WA was oiginally intoduced fo quantum statistical models by Pokof ev, Svistunov and Tupitsyn (997), and late genealized to classical models by Pokof ev and Svistunov (200).

More information

On the Meaning of Message Sequence Charts

On the Meaning of Message Sequence Charts On the Meaning of Message Sequence Chats Manfed Boy Institut fü Infomatik Technische Univesität München Topics: We discuss Message Sequence Chats (MSCs) as a technique to descibe pattens of the inteaction

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

FUSE Fusion Utility Sequence Estimator

FUSE Fusion Utility Sequence Estimator FUSE Fusion Utility Sequence Estimato Belu V. Dasaathy Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500 belu.d@dynetics.com Sean D. Townsend Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500

More information

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies

Supplementary information Efficient Enumeration of Monocyclic Chemical Graphs with Given Path Frequencies Supplementay infomation Efficient Enumeation of Monocyclic Chemical Gaphs with Given Path Fequencies Masaki Suzuki, Hioshi Nagamochi Gaduate School of Infomatics, Kyoto Univesity {m suzuki,nag}@amp.i.kyoto-u.ac.jp

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

Analytical time-optimal trajectories for an omni-directional vehicle

Analytical time-optimal trajectories for an omni-directional vehicle Analytical time-optimal tajectoies fo an omni-diectional vehicle Weifu Wang and Devin J. Balkcom Abstact We pesent the fist analytical solution method fo finding a time-optimal tajectoy between any given

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

ON THE TWO-BODY PROBLEM IN QUANTUM MECHANICS

ON THE TWO-BODY PROBLEM IN QUANTUM MECHANICS ON THE TWO-BODY PROBLEM IN QUANTUM MECHANICS L. MICU Hoia Hulubei National Institute fo Physics and Nuclea Engineeing, P.O. Box MG-6, RO-0775 Buchaest-Maguele, Romania, E-mail: lmicu@theoy.nipne.o (Received

More information

Physics 2A Chapter 10 - Moment of Inertia Fall 2018

Physics 2A Chapter 10 - Moment of Inertia Fall 2018 Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.

More information

Section 8.2 Polar Coordinates

Section 8.2 Polar Coordinates Section 8. Pola Coodinates 467 Section 8. Pola Coodinates The coodinate system we ae most familia with is called the Catesian coodinate system, a ectangula plane divided into fou quadants by the hoizontal

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

To Feel a Force Chapter 7 Static equilibrium - torque and friction

To Feel a Force Chapter 7 Static equilibrium - torque and friction To eel a oce Chapte 7 Chapte 7: Static fiction, toque and static equilibium A. Review of foce vectos Between the eath and a small mass, gavitational foces of equal magnitude and opposite diection act on

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

Non-Linear Dynamics Homework Solutions Week 2

Non-Linear Dynamics Homework Solutions Week 2 Non-Linea Dynamics Homewok Solutions Week Chis Small Mach, 7 Please email me at smach9@evegeen.edu with any questions o concens eguading these solutions. Fo the ececises fom section., we sketch all qualitatively

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

Contact impedance of grounded and capacitive electrodes

Contact impedance of grounded and capacitive electrodes Abstact Contact impedance of gounded and capacitive electodes Andeas Hödt Institut fü Geophysik und extateestische Physik, TU Baunschweig The contact impedance of electodes detemines how much cuent can

More information

Analysis of high speed machining center spindle dynamic unit structure performance Yuan guowei

Analysis of high speed machining center spindle dynamic unit structure performance Yuan guowei Intenational Confeence on Intelligent Systems Reseach and Mechatonics Engineeing (ISRME 0) Analysis of high speed machining cente spindle dynamic unit stuctue pefomance Yuan guowei Liaoning jidian polytechnic,dan

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

Matrix Colorings of P 4 -sparse Graphs

Matrix Colorings of P 4 -sparse Graphs Diplomabeit Matix Coloings of P 4 -spase Gaphs Chistoph Hannnebaue Januay 23, 2010 Beteue: Pof. D. Winfied Hochstättle FenUnivesität in Hagen Fakultät fü Mathematik und Infomatik Contents Intoduction iii

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

Conspiracy and Information Flow in the Take-Grant Protection Model

Conspiracy and Information Flow in the Take-Grant Protection Model Conspiacy and Infomation Flow in the Take-Gant Potection Model Matt Bishop Depatment of Compute Science Univesity of Califonia at Davis Davis, CA 95616-8562 ABSTRACT The Take Gant Potection Model is a

More information

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu

Using Laplace Transform to Evaluate Improper Integrals Chii-Huei Yu Available at https://edupediapublicationsog/jounals Volume 3 Issue 4 Febuay 216 Using Laplace Tansfom to Evaluate Impope Integals Chii-Huei Yu Depatment of Infomation Technology, Nan Jeon Univesity of

More information

A new approach in classical electrodynamics to protect principle of causality

A new approach in classical electrodynamics to protect principle of causality A new appoach in classical electodynamics to potect pinciple of causality Biswaanjan Dikshit * Lase and Plasma Technology Division Bhabha Atomic Reseach Cente, Mumbai-400085 INDIA * Coesponding autho E-mail:

More information

On the integration of the equations of hydrodynamics

On the integration of the equations of hydrodynamics Uebe die Integation de hydodynamischen Gleichungen J f eine u angew Math 56 (859) -0 On the integation of the equations of hydodynamics (By A Clebsch at Calsuhe) Tanslated by D H Delphenich In a pevious

More information

Merging Uncertain Multi-Version XML Documents

Merging Uncertain Multi-Version XML Documents Meging Uncetain Multi-Vesion XML Documents M. Lamine BA, Talel Abdessalem & Piee Senellat ACM DocEng 2013-1st Intenational Wokshop on Document Changes (Floence, Italy) Septembe 10 th, 2013 M. L. Ba, T.

More information

ITI Introduction to Computing II

ITI Introduction to Computing II ITI 1121. Intoduction to Computing II Macel Tucotte School of Electical Engineeing and Compute Science Abstact data type: Stack Stack-based algoithms Vesion of Febuay 2, 2013 Abstact These lectue notes

More information

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

On the Number of Rim Hook Tableaux. Sergey Fomin* and. Nathan Lulov. Department of Mathematics. Harvard University

On the Number of Rim Hook Tableaux. Sergey Fomin* and. Nathan Lulov. Department of Mathematics. Harvard University Zapiski Nauchn. Seminaov POMI, to appea On the Numbe of Rim Hook Tableaux Segey Fomin* Depatment of Mathematics, Massachusetts Institute of Technology Cambidge, MA 0239 Theoy of Algoithms Laboatoy SPIIRAN,

More information

Answering Queries Using Views with Arithmetic. comparisons.

Answering Queries Using Views with Arithmetic. comparisons. Answeing Queies Using Views with Aithmetic Compaisons Foto Afati Electical and Computing Engineeing National Technical Univesity 157 73 Athens, Geece afati@cs.ece.ntua.g Chen Li Infomation and Compute

More information

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function

Research Article On Alzer and Qiu s Conjecture for Complete Elliptic Integral and Inverse Hyperbolic Tangent Function Abstact and Applied Analysis Volume 011, Aticle ID 697547, 7 pages doi:10.1155/011/697547 Reseach Aticle On Alze and Qiu s Conjectue fo Complete Elliptic Integal and Invese Hypebolic Tangent Function Yu-Ming

More information

On a quantity that is analogous to potential and a theorem that relates to it

On a quantity that is analogous to potential and a theorem that relates to it Su une quantité analogue au potential et su un théoème y elatif C R Acad Sci 7 (87) 34-39 On a quantity that is analogous to potential and a theoem that elates to it By R CLAUSIUS Tanslated by D H Delphenich

More information

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension

Functions Defined on Fuzzy Real Numbers According to Zadeh s Extension Intenational Mathematical Foum, 3, 2008, no. 16, 763-776 Functions Defined on Fuzzy Real Numbes Accoding to Zadeh s Extension Oma A. AbuAaqob, Nabil T. Shawagfeh and Oma A. AbuGhneim 1 Mathematics Depatment,

More information

Fresnel Diffraction. monchromatic light source

Fresnel Diffraction. monchromatic light source Fesnel Diffaction Equipment Helium-Neon lase (632.8 nm) on 2 axis tanslation stage, Concave lens (focal length 3.80 cm) mounted on slide holde, iis mounted on slide holde, m optical bench, micoscope slide

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

LINEAR AND NONLINEAR ANALYSES OF A WIND-TUNNEL BALANCE

LINEAR AND NONLINEAR ANALYSES OF A WIND-TUNNEL BALANCE LINEAR AND NONLINEAR ANALYSES O A WIND-TUNNEL INTRODUCTION BALANCE R. Kakehabadi and R. D. Rhew NASA LaRC, Hampton, VA The NASA Langley Reseach Cente (LaRC) has been designing stain-gauge balances fo utilization

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

The Implementation of the Conditions for the Existence of the Most Specific Generalizations w.r.t. General EL-TBoxes

The Implementation of the Conditions for the Existence of the Most Specific Generalizations w.r.t. General EL-TBoxes The Implementation of the Conditions fo the Existence of the Most Specific Genealizations w..t. Geneal EL-TBoxes Adian Nuadiansyah Technische Univesität Desden Supevised by: Anni-Yasmin Tuhan Febuay 12,

More information

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix

Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matrix Jounal of Sciences, Islamic Republic of Ian (): - () Univesity of Tehan, ISSN - http://sciencesutaci Localization of Eigenvalues in Small Specified Regions of Complex Plane by State Feedback Matix H Ahsani

More information

Liquid gas interface under hydrostatic pressure

Liquid gas interface under hydrostatic pressure Advances in Fluid Mechanics IX 5 Liquid gas inteface unde hydostatic pessue A. Gajewski Bialystok Univesity of Technology, Faculty of Civil Engineeing and Envionmental Engineeing, Depatment of Heat Engineeing,

More information

A scaling-up methodology for co-rotating twin-screw extruders

A scaling-up methodology for co-rotating twin-screw extruders A scaling-up methodology fo co-otating twin-scew extudes A. Gaspa-Cunha, J. A. Covas Institute fo Polymes and Composites/I3N, Univesity of Minho, Guimaães 4800-058, Potugal Abstact. Scaling-up of co-otating

More information

The Chromatic Villainy of Complete Multipartite Graphs

The Chromatic Villainy of Complete Multipartite Graphs Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:

More information

THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX. Jaejin Lee

THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX. Jaejin Lee Koean J. Math. 23 (2015), No. 3, pp. 427 438 http://dx.doi.og/10.11568/kjm.2015.23.3.427 THE JEU DE TAQUIN ON THE SHIFTED RIM HOOK TABLEAUX Jaejin Lee Abstact. The Schensted algoithm fist descibed by Robinson

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

Math 2263 Solutions for Spring 2003 Final Exam

Math 2263 Solutions for Spring 2003 Final Exam Math 6 Solutions fo Sping Final Exam ) A staightfowad appoach to finding the tangent plane to a suface at a point ( x, y, z ) would be to expess the cuve as an explicit function z = f ( x, y ), calculate

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

4. Kruskal Coordinates and Penrose Diagrams.

4. Kruskal Coordinates and Penrose Diagrams. 4. Kuskal Coodinates and Penose Diagams. 4.1. Removing a coodinate ingulaity at the chwazschild Radius. The chwazschild metic has a singulaity at = whee g 0 and g. Howeve, 00 we have aleady seen that a

More information

A Relativistic Electron in a Coulomb Potential

A Relativistic Electron in a Coulomb Potential A Relativistic Electon in a Coulomb Potential Alfed Whitehead Physics 518, Fall 009 The Poblem Solve the Diac Equation fo an electon in a Coulomb potential. Identify the conseved quantum numbes. Specify

More information

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS?

HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? 6th INTERNATIONAL MULTIDISCIPLINARY CONFERENCE HOW TO TEACH THE FUNDAMENTALS OF INFORMATION SCIENCE, CODING, DECODING AND NUMBER SYSTEMS? Cecília Sitkuné Göömbei College of Nyíegyháza Hungay Abstact: The

More information

Evolutionary approach to Quantum and Reversible Circuits synthesis

Evolutionary approach to Quantum and Reversible Circuits synthesis Evolutionay appoach to Quantum and Revesible Cicuits synthesis Matin Lukac, Maek Pekowski, Hilton Goi, Mikhail Pivtoaiko +, Chung Hyo Yu, Kyusik Chung, Hyunkoo Jee, Byung-guk Kim, Yong-Duk Kim Depatment

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

Review: Electrostatics and Magnetostatics

Review: Electrostatics and Magnetostatics Review: Electostatics and Magnetostatics In the static egime, electomagnetic quantities do not vay as a function of time. We have two main cases: ELECTROSTATICS The electic chages do not change postion

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi

Hua Xu 3 and Hiroaki Mukaidani 33. The University of Tsukuba, Otsuka. Hiroshima City University, 3-4-1, Ozuka-Higashi he inea Quadatic Dynamic Game fo Discete-ime Descipto Systems Hua Xu 3 and Hioai Muaidani 33 3 Gaduate School of Systems Management he Univesity of suuba, 3-9- Otsua Bunyo-u, oyo -0, Japan xuhua@gssm.otsua.tsuuba.ac.jp

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

Moment-free numerical approximation of highly oscillatory integrals with stationary points

Moment-free numerical approximation of highly oscillatory integrals with stationary points Moment-fee numeical appoximation of highly oscillatoy integals with stationay points Sheehan Olve Abstact We pesent a method fo the numeical quadatue of highly oscillatoy integals with stationay points.

More information

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis Bief summay of functional analysis APPM 5440 Fall 014 Applied Analysis Stephen Becke, stephen.becke@coloado.edu Standad theoems. When necessay, I used Royden s and Keyzsig s books as a efeence. Vesion

More information

arxiv: v1 [physics.pop-ph] 3 Jun 2013

arxiv: v1 [physics.pop-ph] 3 Jun 2013 A note on the electostatic enegy of two point chages axiv:1306.0401v1 [physics.pop-ph] 3 Jun 013 A C Tot Instituto de Física Univesidade Fedeal do io de Janeio Caixa Postal 68.58; CEP 1941-97 io de Janeio,

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

Physics 235 Chapter 5. Chapter 5 Gravitation

Physics 235 Chapter 5. Chapter 5 Gravitation Chapte 5 Gavitation In this Chapte we will eview the popeties of the gavitational foce. The gavitational foce has been discussed in geat detail in you intoductoy physics couses, and we will pimaily focus

More information

Solving Some Definite Integrals Using Parseval s Theorem

Solving Some Definite Integrals Using Parseval s Theorem Ameican Jounal of Numeical Analysis 4 Vol. No. 6-64 Available online at http://pubs.sciepub.com/ajna///5 Science and Education Publishing DOI:.69/ajna---5 Solving Some Definite Integals Using Paseval s

More information

Lab #4: Newton s Second Law

Lab #4: Newton s Second Law Lab #4: Newton s Second Law Si Isaac Newton Reading Assignment: bon: Januay 4, 1643 Chapte 5 died: Mach 31, 1727 Chapte 9, Section 9-7 Intoduction: Potait of Isaac Newton by Si Godfey Knelle http://www.newton.cam.ac.uk/at/potait.html

More information

Centripetal Force OBJECTIVE INTRODUCTION APPARATUS THEORY

Centripetal Force OBJECTIVE INTRODUCTION APPARATUS THEORY Centipetal Foce OBJECTIVE To veify that a mass moving in cicula motion expeiences a foce diected towad the cente of its cicula path. To detemine how the mass, velocity, and adius affect a paticle's centipetal

More information

Application of Parseval s Theorem on Evaluating Some Definite Integrals

Application of Parseval s Theorem on Evaluating Some Definite Integrals Tukish Jounal of Analysis and Numbe Theoy, 4, Vol., No., -5 Available online at http://pubs.sciepub.com/tjant/// Science and Education Publishing DOI:.69/tjant--- Application of Paseval s Theoem on Evaluating

More information

On decompositions of complete multipartite graphs into the union of two even cycles

On decompositions of complete multipartite graphs into the union of two even cycles On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

Mathematical Model of Magnetometric Resistivity. Sounding for a Conductive Host. with a Bulge Overburden

Mathematical Model of Magnetometric Resistivity. Sounding for a Conductive Host. with a Bulge Overburden Applied Mathematical Sciences, Vol. 7, 13, no. 7, 335-348 Mathematical Model of Magnetometic Resistivity Sounding fo a Conductive Host with a Bulge Ovebuden Teeasak Chaladgan Depatment of Mathematics Faculty

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

Physics 211: Newton s Second Law

Physics 211: Newton s Second Law Physics 211: Newton s Second Law Reading Assignment: Chapte 5, Sections 5-9 Chapte 6, Section 2-3 Si Isaac Newton Bon: Januay 4, 1643 Died: Mach 31, 1727 Intoduction: Kinematics is the study of how objects

More information

Safety variations in steel designed using Eurocode 3

Safety variations in steel designed using Eurocode 3 JCSS Wokshop on eliability Based Code Calibation Safety vaiations in steel designed using Euocode 3 Mike Byfield Canfield Univesity Swindon, SN6 8LA, UK David Nethecot Impeial College London SW7 2BU, UK

More information

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013

AQI: Advanced Quantum Information Lecture 2 (Module 4): Order finding and factoring algorithms February 20, 2013 AQI: Advanced Quantum Infomation Lectue 2 (Module 4): Ode finding and factoing algoithms Febuay 20, 203 Lectue: D. Mak Tame (email: m.tame@impeial.ac.uk) Intoduction In the last lectue we looked at the

More information

Application of homotopy perturbation method to the Navier-Stokes equations in cylindrical coordinates

Application of homotopy perturbation method to the Navier-Stokes equations in cylindrical coordinates Computational Ecology and Softwae 5 5(): 9-5 Aticle Application of homotopy petubation method to the Navie-Stokes equations in cylindical coodinates H. A. Wahab Anwa Jamal Saia Bhatti Muhammad Naeem Muhammad

More information

Utility Estimation and Preference Aggregation under Uncertainty by Maximum Entropy Inference

Utility Estimation and Preference Aggregation under Uncertainty by Maximum Entropy Inference Utility Estimation and Pefeence Aggegation unde Uncetainty by Maximum Entopy Infeence Andé Ahua FenUnivesität in Hagen D-5884 Hagen ande.ahua@fenuni-hagen.de ABSTRACT. This pape deals with the poblem how

More information

Research Design - - Topic 17 Multiple Regression & Multiple Correlation: Two Predictors 2009 R.C. Gardner, Ph.D.

Research Design - - Topic 17 Multiple Regression & Multiple Correlation: Two Predictors 2009 R.C. Gardner, Ph.D. Reseach Design - - Topic 7 Multiple Regession & Multiple Coelation: Two Pedictos 009 R.C. Gadne, Ph.D. Geneal Rationale and Basic Aithmetic fo two pedictos Patial and semipatial coelation Regession coefficients

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

Reading Assignment. Problem Description for Homework #9. Read Chapters 29 and 30.

Reading Assignment. Problem Description for Homework #9. Read Chapters 29 and 30. Reading Assignment Read Chaptes 29 and 30. Poblem Desciption fo Homewok #9 In this homewok, you will solve the inhomogeneous Laplace s equation to calculate the electic scala potential that exists between

More information