Depth Boundedness in Multiset Rewriting Systems with Name Binding

被引:0
|
作者
Rosa-Velardo, Fernando [1 ]
机构
[1] Univ Complutense Madrid, Dpto Sistemas Informat & Computac, E-28040 Madrid, Spain
来源
REACHABILITY PROBLEMS | 2010年 / 6227卷
关键词
PI-CALCULUS; PETRI NETS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we consider nu-MSR, a formalism that combines the two main existing approaches for multiset rewriting, namely MSR and CMRS. In nu-MSR we rewrite multisets of atomic formulae, in which some names may be restricted. nu-MSR are Turing complete. In particular, a very straightforward encoding of pi-calculus process can be done. Moreover, p nu-PN, an extension of Petri nets in which tokens are tuples of pure names, are equivalent to nu-MSR. We know that the monadic subclass of nu-MSR is a Well Structured Transition System. Here we prove that depth-bounded nu-MSR, that is, nu-MSR systems for which the interdependance of names is bounded, are also Well Structured, by following the analogous steps to those followed by R. Meyer in the case of the pi-calculus. As a corollary, also depth-bounded p nu-PN are WSTS, so that coverability is decidable for them.
引用
收藏
页码:161 / 175
页数:15
相关论文
共 50 条
  • [31] Relating process algebras and multiset rewriting for immediate decryption protocols
    Bistarelli, S
    Cervesato, I
    Lenzini, G
    Martinelli, F
    COMPUTER NETWORK SECURITY, 2003, 2776 : 86 - 99
  • [32] On boundedness in depth in the π-calculus
    Meyer, Roland
    FIFTH IFIP INTERNATIONAL CONFERENCE ON THEORETICAL COMPUTER SCIENCE - TCS 2008, 2008, 273 : 477 - 489
  • [33] A comparison between strand spaces and multiset rewriting for security protocol analysis
    Cervesato, Iliano
    Durgin, Nancy A.
    Lincoln, Patrick D.
    Mitchell, John C.
    Scedrov, Andre
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (02) : 265 - 316
  • [34] Multiset splicing systems
    Dassow, J
    Vaszil, G
    BIOSYSTEMS, 2004, 74 (1-3) : 1 - 7
  • [35] A comparison between strand spaces and multiset rewriting for security protocol analysis
    Cervesato, I
    Durgin, N
    Lincoln, P
    Mitchel, J
    Scedrov, A
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 356 - 383
  • [36] WRITING IS REWRITING + ECO THE 'NAME OF THE ROSE'
    NADIN, M
    AMERICAN JOURNAL OF SEMIOTICS, 1987, 5 (01): : 115 - 131
  • [37] Fluid Computing - Interest-based Communication in Dataflow/Multiset Rewriting Computing
    de Mello Junior, Rui Rodrigues
    de Araujo, Leandro Santiago
    Cadette Dutra, Diego Leonel
    Louis Paillard, Gabriel Antoine
    de Amorim, Claudio Luis
    Galvao Franca, Felipe Maia
    PROCEEDINGS OF THE 10TH EURO-AMERICAN CONFERENCE ON TELEMATICS AND INFORMATION SYSTEMS (EATIS 2020), 2020,
  • [38] Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting
    Paradzik, Petar
    Derek, Ante
    2022 IEEE 35TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2022), 2022, : 1 - 16
  • [39] Multiset constraints and P systems
    Dovier, A
    Piazza, C
    Rossi, G
    MULTISET PROCESSING: MATHEMATICAL, COMPUTER SCIENCE, AND MOLECULAR COMPUTING POINTS OF VIEW, 2001, 2235 : 103 - 121
  • [40] Multiset constraints and P systems
    Dovier, Agostino
    Piazza, Carla
    Rossi, Gianfranco
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2001, 2235 : 103 - 121