Altmetrics
Downloads
63
Views
31
Comments
0
This version is not peer-reviewed
Submitted:
19 April 2024
Posted:
23 April 2024
You are already at the latest version
Algorithm 1: Mapping a Petri net onto a CCA process |
1 | First in First out |
Processes | Context-expressions | ||||||
inactivity | empty context | ||||||
parallel composition | true | ||||||
block | false | ||||||
name restriction | name match | ||||||
replication | hole | ||||||
ambient | location context | ||||||
context-guarded prefix | parallel composition | ||||||
if-then | conjunction | ||||||
… | disjunction | ||||||
negation | |||||||
if-then-else | spatial next modality | ||||||
somewhere modality | |||||||
arithmetic | |||||||
search | |||||||
process abstraction | |||||||
M | Capabilities | Locations | |||||
one transition | @ | any parent | |||||
move into ambient n | specific parent n | ||||||
move out of parent | # | any child | |||||
delete ambient n | specific child n | ||||||
receive data from | any sibling | ||||||
send data to | specific sibling n | ||||||
process abstraction call | locally |
C |
⊧ | ||||
C | ⊧ | iff | ||
C | ⊧ | iff | ||
C | ⊧ | iff | ||
C | ⊧ | iff | ||
C | ⊧ | iff | ||
C | ⊧ | iff | ||
C | ⊧ | iff | ||
C | ⊧ | iff | ||
C | ⊧ | iff | or |
= | n is located at self. | ||
= | self is located at n. | ||
= | m is located at n. | ||
= | self is with n. | ||
= | n is with m. | ||
= | the current state of p is x. | ||
= | the lock is on. |
(R1) | if |
(R2) | |
, for some i, . | |
(R3) | |
(R4) | |
if . | |
(R5) | |
if |
Inputs | Outputs | |||
---|---|---|---|---|
Coin | Cryptographer | Petri net | CCA process | |
markings | markings | Enabled transitions | Executed ambients | # |
, | A0a, B1c | 1 | ||
, | A1c, B0a | 2 | ||
, | A1c, B1c | 3 | ||
, | A1a, B0c | 4 | ||
, | A0c, B1a | 5 | ||
, | A0c, B0c | 6 | ||
, | A1b, B0b | 7 | ||
, | A0d, B1b | 8 | ||
, | A0d, B0d | 9 | ||
, | A0b, B1d | 10 | ||
, | A1d, B0b | 11 | ||
, | A1d, B1d | 12 |
Dr. François Siewe is a Reader in Software Engineering in the School of Computer Science and Informatics at De Montfort University (DMU) in Leicester in the UK. He received a Ph.D. degree in Computer Science from De Montfort University in 2005. He obtained a B.Sc. degree in Mathematics and Computer Science in 1990, a M.Sc. degree in 1991, a Diplome d’Etude Approfondie (DEA) degree in Computer Science in 1992, and a Doctorat de Troisième Cycle degree in Computer Science in 1997 from the University of Yaoundé I in Yaoundé, Cameroon. Prior to joining DMU, he was a Fellow at the United Nations University International Institute for Software Technology (UNU-IIST) in Macua in China, and a Lecturer at the University of Dschang in Cameroon. His research interests include software engineering, formal methods, cyber security, context-aware and pervasive computing, and Internet of Things (IoT). | |
Dr. Vasileios Germanos is a Senior Lecturer in Computer Science in the Scholl of Computer Science and Informatics at De Montfort University, in Leicester in the UK. He obtained his MSc and PhD, both in Computing Science, from Newcastle University, UK. His research include formal methods, concurrent systems and cyber security. | |
Dr. Wen Zeng is an Associate Professor in the School of Computer and Information Engineering at Shanghai Polytechnic University. She is an Honorary Senior Research Fellow at De Montfort University, U.K., and a Guest Member of Staff at Newcastle University, U.K. She received her PhD and MSc both from Newcastle University, U.K. After that, she became a Post-doc Research Associate at Newcastle University. In 2017, she joined the School of Computer Science and Informatics at De Montfort University to work as a Tenured Senior Lecturer in Cybersecurity. Her current research interests center on the system design and optimization, including distributed systems, Internet of Things with Cloud computing systems, information flow, Cybersecurity, data privacy and risk management, and big data. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 MDPI (Basel, Switzerland) unless otherwise stated