• Aucun résultat trouvé

Preface of the International Workshop on Petri Net-based Security (WooPS)

N/A
N/A
Protected

Academic year: 2022

Partager "Preface of the International Workshop on Petri Net-based Security (WooPS)"

Copied!
1
0
0

Texte intégral

(1)

Preface of the International Workshop on Petri Net-based Security (WooPS)

Rafael Accorsi1, Tadao Murata2, and Silvio Ranise3

1 University of Freiburg, Germany accorsi@iig.uni-freiburg.de

2 University of Illinois at Chicago, USA murata@uic.edu

3 Fundazione Bruno Kessler, Italy ranise@fbk.eu

Petri nets provide an expressive and well-studied formalism to specify and rea- son about security and reliability properties of abstractions/views of modern applications, such as smart grids and distributed enterprise systems. It is how- ever unclear how the cornucopia of available techniques (based on Petri nets and related concurrency models) can provide results of the analysis with su- cient precision to increase the condence of designers in the overall security of the new applications. The assessment of these techniques with respect to correct- ness, computational complexity, and real-world case-studies is indeed mandatory to signicantly advance the state-of-the-art of the emerging research area.

The WooPS session was centered around the study of new methodologies and analysis techniques at the crossroads of the Petri net and security communities.

Concerning methodologies, in the paper "Analysing SONAR Model Trans- formations," Köhler-Bussmeier studies the dynamics of organization models, de- scribed as Petri nets, under model transformations, specied as transitions of a Petri net. With regard to analysis techniques, in the paper "Inference of Local Properties in Petri Nets Composed through an Interface," Ferigato and Mangioni study a notion of visibility of the local states for composition of elementary Petri nets representing a service provider (defender), a client of the service (attacker), and the protocol of interaction (interface). A notion of visibility formalizes the idea that an attacker tries to infer the validity of a local state of the defender even though only the interface is observable.

We would like to thank the authors of the papers for their eorts in pro- ducing stimulating contributions to the WooPS session. We also thank Prof.

Karsten Wolf for his instigating keynote address during the WooPS session.

Finally, thanks to the members of the organizing committees of the 33rd Inter- national Conference on Application and Theory of Petri Nets and Concurrency and the 12th International Conference on Application of Concurrency to System Design to which this event is aliated.

Rafael Accorsi, Tadao Murata, and Silvio Ranise

Références

Documents relatifs

In timed Petri nets temporal properties are associated with transitions as transition firing times (or occurrence times).. Specific prop- erties of timed nets, such as boundedness

For this reason, the non-structural properties can be used as limiting conditions on the class of transition systems eligible for Petri net (pre-)synthesis; this will be

In timed nets [65], [70], [83], firing times are associated with transitions, and transition firings are real–time events, i.e., tokens are removed from input places at the beginning

Fig.19 shows one of possible Petri net models for such a tool with a dual–blade robot; the double use of chamber 2 in each cycle is represented by two unload/load transitions (t 2a

Timed Petri nets have been introduced by Ramchandani [Ram74] by assigning firing times to the transitions of Petri nets (t–timed nets), and by Sifakis [Si77] by assigning time to

To verify the reachability of the previously given marking (h1 + 2 + 2i.Send), the backward reacha- bility analysis is performed using the inverse CPN, illustrated in Fig.8.. Those

- Level 3 provides a complete solution for train localization (calculated onboard using Eurobalises also and transmitted by radio to trackside equipments) transmission of move-

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des