DECENT: A Benchmark for Decentralized Enforcement

被引:1
作者
Gallay, Florian [1 ]
Falcone, Ylies [1 ]
机构
[1] Univ Grenoble Alpes, CNRS, Grenoble INP, Inria,LIG, F-38000 Grenoble, France
来源
RUNTIME VERIFICATION (RV 2022) | 2022年 / 13498卷
关键词
RUNTIME ENFORCEMENT; TIMED PROPERTIES;
D O I
10.1007/978-3-031-17196-3_18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
DECENT is a benchmark for evaluating decentralized enforcement. It implements two enforcement algorithms that differ in their strategy for correcting the execution: the first one explores all alternatives to perform a globally optimal correction, while the second follows an incremental strategy based on locally optimal choices. Decent allows comparing these algorithms with a centralized enforcement algorithm in terms of computational metrics and metrics for decentralized monitoring such as the number and size of messages or the required computation on each component. Our experiments show that (i) the number of messages sent and the internal memory usage is much smaller with decentralized algorithms (ii) the locally optimal algorithm performs closely to the globally optimal one.
引用
收藏
页码:293 / 303
页数:11
相关论文
共 50 条
  • [41] Runtime Verification and Enforcement, the (Industrial) Application Perspective (Track Introduction)
    Bartocci, Ezio
    Falcone, Ylies
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: DISCUSSION, DISSEMINATION, APPLICATIONS, ISOLA 2016, PT II, 2016, 9953 : 333 - 338
  • [42] Practical Run-Time Norm Enforcement with Bounded Lookahead
    Alechina, Natasha
    Bulling, Nils
    Dastani, Mehdi
    Logan, Brian
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15), 2015, : 443 - 451
  • [43] Gate automata-driven run-time enforcement
    Costa, Gabriele
    Matteucci, Ilaria
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (02) : 518 - 524
  • [44] Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    Kovacs, Mate
    Seidl, Helmut
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 46 - 59
  • [45] Adaptive Industrial Control Systems via IEC 61499 and Runtime Enforcement
    Faqrizal, Irman
    Salaün, Gwen
    Falcone, Yliès
    ACM Transactions on Autonomous and Adaptive Systems, 2024, 19 (04)
  • [46] AppGuard - Fine-Grained Policy Enforcement for Untrusted Android Applications
    Backes, Michael
    Gerling, Sebastian
    Hammer, Christian
    Maffei, Matteo
    von Styp-Rekowsky, Philipp
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 213 - 231
  • [47] Compositional runtime enforcement of safety and co-safety timed properties
    Shankar, Saumya
    Pinisetty, Srinivas
    INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2025, : 169 - 199
  • [48] Towards a Security Framework for Artifact-centric Workflows Leveraging Runtime Enforcement
    Gupta, Gaurav
    Shankar, Saumya
    Pinisetty, Srinivas
    JOURNAL OF OBJECT TECHNOLOGY, 2024, 23 (02):
  • [49] Fully automated runtime enforcement of component-based systems with formal and sound recovery
    Yliès Falcone
    Mohamad Jaber
    International Journal on Software Tools for Technology Transfer, 2017, 19 : 341 - 365
  • [50] Real-Time Policy Enforcement with Metric First-Order Temporal Logic
    Hublet, Francois
    Basin, David
    Krstic, Srdan
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 211 - 232