Event structures : maps, monads and spans : invited talk

Event structures are a model of computational processes. They represent a process as a set of event occurrences with relations to express how events causally depend on others, or exclude other events from occurring. In one of their simpler forms they consist of a set of events on which there is a consistency relation expressing when events can occur together in a history and a partial order of causal dependency— writing e′ ≤ e if the occurrence of e depends on the previous occurrence of e′. In detail, an event structure comprises (E,Con,≤), consisting of a set E, of events which are partially ordered by ≤, the causal dependency relation, and a predicate Con consisting of finite subsets of E, the consistency relation, which satisfy {e′ | e′ ≤ e} is finite for all e ∈ E, {e} ∈ Con for all e ∈ E, Y ⊆ X ∈ Con ⇒ Y ∈ Con, and X ∈ Con & e ≤ e′ ∈ X ⇒ X ∪ {e} ∈ Con. Our understanding of the consistency predicate and the enabling relation are expressed in the notion of configuration (or state or history) we adopt for event structures. The events are to be thought of as event occurrences; in any history an event is to appear at most once. A configuration is a set of events which have occurred by some stage in a process. According to our understanding of the consistency predicate and causal dependency relations a configuration should be consistent and such that if an event appears in a configuration then so do all the events on which it causally depends. A configuration of an event structure E is a subset x ⊆ E which is Consistent: ∀X ⊆ x. X ∈ Con, and The configurations of an event structure are ordered by inclusion, where x ⊆ x′, i.e. x is a sub-configuration of x′, means that x is a sub-history of x′. This is a preliminary version. The final version will be published in Electronic Notes in Theoretical Computer Science URL: www.elsevier.nl/locate/entcs

[1]  Rocco De Nicola,et al.  Testing Equivalence for Processes , 1983, ICALP.

[2]  Chang Liu,et al.  Term rewriting and all that , 2000, SOEN.

[3]  Ian Mackie Efficient λ-evaluation with interaction nets , 2004 .

[4]  Ian Mackie,et al.  A Calculus for Interaction Nets , 1999, PPDP.

[5]  Emilio Tuosto,et al.  The Klaim Project: Theory and Practice , 2003, Global Computing.

[6]  R. J. vanGlabbeek The linear time - branching time spectrum , 1990 .

[7]  Martín Abadi,et al.  Deciding knowledge in security protocols under (many more) equational theories , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).

[8]  Davide Sangiorgi,et al.  On asynchrony in name-passing calculi , 1998, Mathematical Structures in Computer Science.

[9]  Matthew Hennessy,et al.  Testing Theories for Asynchronous Languages , 1998, FSTTCS.

[10]  Jorge Sousa Pinto,et al.  Sequential and Concurrent Abstract Machines for Interaction Nets , 2000, FoSSaCS.

[11]  Yannick Chevalier,et al.  Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents , 2003, FSTTCS.

[12]  Ugo Montanari,et al.  History-Dependent Automata , 1998 .

[13]  Véronique Cortier,et al.  A survey of algebraic properties used in cryptographic protocols , 2006, J. Comput. Secur..

[14]  Javier Esparza,et al.  Decidability and Complexity of Petri Net Problems - An Introduction , 1996, Petri Nets.

[15]  Martín Abadi,et al.  A Calculus for Cryptographic Protocols: The spi Calculus , 1999, Inf. Comput..

[16]  Catuscia Palamidessi,et al.  Comparing the expressive power of the synchronous and the asynchronous π-calculus , 1998, POPL '97.

[17]  Didier Caucal,et al.  On the Regular Structure of Prefix Rewriting , 1990, Theor. Comput. Sci..

[18]  Rocco De Nicola,et al.  Testing Equivalence for Mobile Processes , 1995, Inf. Comput..

[19]  Nathalie Bertrand,et al.  Model Checking Lossy Channels Systems Is Probably Decidable , 2003, FoSSaCS.

[20]  Claude Kirchner,et al.  A rho-Calculus of Explicit Constraint Application , 2004, WRLA.

[21]  Uwe Nestmann,et al.  On Bisimulations for the Spi Calculus , 2002, AMAST.

[22]  Glynn Winskel,et al.  Bisimulation from Open Maps , 1994, Inf. Comput..

[23]  Martín Abadi,et al.  A Bisimulation Method for Cryptographic Protocols , 1998, Nord. J. Comput..

[24]  Parosh Aziz Abdulla,et al.  Algorithmic Analysis of Programs with Well Quasi-ordered Domains , 2000, Inf. Comput..

[25]  Yves Lafont,et al.  Interaction nets , 1989, POPL '90.

[26]  Maciej Koutny,et al.  Asynchronous Box Calculus , 2002, Fundam. Informaticae.

[27]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[28]  Robert de Simone,et al.  The SL Synchronous Language , 1996, IEEE Trans. Software Eng..

[29]  Uwe Nestmann,et al.  Symbolic Bisimulation in the Spi Calculus , 2004, CONCUR.

[30]  D. Walker,et al.  A Calculus of Mobile Processes, Part I , 1989 .

[31]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[32]  Stephen A. Cook,et al.  Characterizations of Pushdown Machines in Terms of Time-Bounded Computers , 1971, J. ACM.

[33]  Roberto M. Amadio,et al.  Max-Plus Quasi-interpretations , 2003, TLCA.

[34]  C. Bodei,et al.  Some Concurrency Models in a Categorical Framework Extended Abstract , 1998 .

[35]  Thomas A. Henzinger,et al.  A classification of symbolic transition systems , 2000, TOCL.

[36]  Bruno Blanchet,et al.  An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[37]  Pierre Wolper,et al.  An efficient automata approach to some problems on context-free grammars , 2000, Inf. Process. Lett..

[38]  Jorge Sousa Pinto,et al.  Weak reduction and garbage collection in interaction nets , 2003, WRS.

[39]  Alain Finkel,et al.  Unreliable Channels are Easier to Verify Than Perfect Channels , 1996, Inf. Comput..

[40]  Maria Grazia Buscemi,et al.  A method for symbolic analysis of security protocols , 2005, Theor. Comput. Sci..

[41]  Søren Christensen,et al.  Coloured Petri Nets Extended with Place Capacities, Test Arcs and Inhibitor Arcs , 1992, Application and Theory of Petri Nets.

[42]  Diletta Cacciagrano,et al.  On Synchronous and Asynchronous Communication Paradigms , 2001, ICTCS.

[43]  Frank S. de Boer,et al.  Asynchronous communication in process algebra , 1992, [1992] Proceedings of the Seventh Annual IEEE Symposium on Logic in Computer Science.

[44]  Berthold Hoffmann,et al.  Hierarchical Graph Transformation , 2002, J. Comput. Syst. Sci..

[45]  Parosh Aziz Abdulla,et al.  Verifying Programs with Unreliable Channels , 1996, Inf. Comput..

[46]  Hanna Klaudel,et al.  M-nets: An algebra of high-level Petri nets, with an application to the semantics of concurrent programming languages , 1998, Acta Informatica.

[47]  Mario Tokoro,et al.  An Object Calculus for Asynchronous Communication , 1991, ECOOP.

[48]  Faron Moller,et al.  Verification on Infinite Structures , 2001, Handbook of Process Algebra.

[49]  L. Dickson Finiteness of the Odd Perfect and Primitive Abundant Numbers with n Distinct Prime Factors , 1913 .

[50]  Claude Kirchner,et al.  Pure patterns type systems , 2003, POPL '03.

[51]  Silvano Dal-Zilio,et al.  Resource control for synchronous cooperative threads , 2005, Theor. Comput. Sci..

[52]  Simon L. Peyton Jones,et al.  The Implementation of Functional Programming Languages , 1987 .

[53]  Roberto M. Amadio Synthesis of max-plus quasi-interpretations , 2005, Fundam. Informaticae.

[54]  Maciej Koutny,et al.  Petri Net Algebra , 2001, Monographs in Theoretical Computer Science An EATCS Series.

[55]  Rocco De Nicola,et al.  Proof techniques for cryptographic processes , 1999, Proceedings. 14th Symposium on Logic in Computer Science (Cat. No. PR00158).

[56]  Ian Mackie,et al.  A Higher-Order Calculus for Graph Transformation , 2007, TERMGRAPH.

[57]  Val Tannen,et al.  A Typed Pattern Calculus , 1996, Inf. Comput..

[58]  Rocco De Nicola,et al.  On the expressive power of KLAIM-based calculi , 2006, Theor. Comput. Sci..

[59]  Martín Abadi,et al.  A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.

[60]  Andrea Asperti,et al.  The bologna optimal higher-order machine , 1995, Journal of Functional Programming.

[61]  Uwe Nestmann What is a "Good" Encoding of Guarded Choice? , 2000, Inf. Comput..

[62]  Maribel Fernández,et al.  Interaction Nets with McCarthy's amb: Properties and Applications , 2003, Nord. J. Comput..

[63]  Claude Kirchner,et al.  Rewriting Calculus with(out) Types , 2004, Workshop on Rewriting Logic and Its Applications.

[64]  Robin Milner,et al.  Bigraphs and mobile processes (revised) , 2004 .

[65]  Mark Ryan,et al.  Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks , 2005, SecCo.

[66]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[67]  Jonathan K. Millen,et al.  Three systems for cryptographic protocol analysis , 1994, Journal of Cryptology.

[68]  Matthew Hennessy,et al.  Algebraic theory of processes , 1988, MIT Press series in the foundations of computing.

[69]  Martín Abadi,et al.  Deciding knowledge in security protocols under equational theories , 2004, Theor. Comput. Sci..

[70]  Corrado Priami,et al.  Global Computing. Programming Environments, Languages, Security, and Analysis of Systems , 2003, Lecture Notes in Computer Science.

[71]  Maciej Koutny,et al.  A Petri Net Semantics of a Simple Process Algebra for Mobility , 2005, EXPRESS.

[72]  Alain Finkel,et al.  Decidability of the termination problem for completely specified protocols , 1994, Distributed Computing.

[73]  Yuxi Fu On quasi-open bisimulation , 2005, Theor. Comput. Sci..

[74]  John C. Mitchell,et al.  Probabilistic polynomial-time process calculus and security protocol analysis , 2001, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science.

[75]  Neil D. Jones,et al.  The size-change principle for program termination , 2001, POPL '01.

[76]  Kohei,et al.  Two bisimilarities in-calculus , 2007 .

[77]  Alain Finkel,et al.  A Generalization of the Procedure of Karp and Miller to Well Structured Transition Systems , 1987, ICALP.

[78]  Graham Higman,et al.  Ordering by Divisibility in Abstract Algebras , 1952 .

[79]  Martín Abadi,et al.  Mobile values, new names, and secure communication , 2001, POPL '01.

[80]  Ian Mackie,et al.  Interaction Nets and Term-Rewriting Systems , 1998, Theor. Comput. Sci..

[81]  Catuscia Palamidessi,et al.  Separation of synchronous and asynchronous communication via testing , 2007, Theor. Comput. Sci..

[82]  Marc Pouzet,et al.  ReactiveML: a reactive extension to ML , 2005, PPDP.

[83]  Martín Abadi,et al.  The geometry of optimal lambda reduction , 1992, POPL '92.