Refinement Composition Using Doubly Labeled Transition Graphs

Abstract : Process Algebra forms a cornerstone in the formal methods area of Computer Science. Among the more widely used approaches is Milner's Communication and Concurrency Systems (CCS). Recently CCS has been extended by Schmidt and Bibighaus through the introduction of Doubly Labeled Transition Systems. This framework has enhanced the model s ability to capture security and availability properties. In this thesis we reformulate, simplify, and extend Bibighaus work using a graph theoretic framework. The intent is that this abstract mathematical view will make the results more accessible and stimulate additional research. Existing definitions and theorems are redefined and proved using Labeled and Doubly Labeled Transition Graphs (LTG and DLTG). CCS simulation concepts are recast as graph morphisms and the notion of abstraction and refinement are explained through the use of graphs. Bibighaus work is extended by showing how to carry out non-atomic DLTG refinement, and by developing a form of graph composition involving graph refinements that share a common abstract graph. This type of composition is proven to always be possible with DLTG refinements, and we demonstrate that the composite graph is both a refinement of the abstract graph, and an abstract graph for the refinements from which it was made.

[1]  Linda Null,et al.  The essentials of computer organization and architecture , 2003 .

[2]  Gary Chartrand,et al.  Introduction to Graph Theory , 2004 .

[3]  Radha Jagadeesan,et al.  Modal Transition Systems: A Foundation for Three-Valued Program Analysis , 2001, ESOP.

[4]  Robin Milner,et al.  Communication and concurrency , 1989, PHI Series in computer science.

[5]  Faron Moller,et al.  On the computational complexity of bisimulation , 1995, CSUR.

[6]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[7]  David A. Schmidt From Trace Sets to Modal-Transition Systems by Stepwise Abstract Interpretation , 2003 .

[8]  Robert E. Tarjan,et al.  Three Partition Refinement Algorithms , 1987, SIAM J. Comput..

[9]  Dennis Dams,et al.  Abstract interpretation and partition refinement for model checking , 1996 .

[10]  David L. Bibighaus,et al.  Applying Doubly Labeled Transition Systems to the Refinement Paradox , 2005 .

[11]  Eerke A. Boiten,et al.  Recent Advances in Refinement , 2003, Abstract State Machines.

[12]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[13]  Howard Bowman,et al.  Weak Refinement in Z , 1997, ZUM.

[14]  David A. Schmidt Structure-Preserving Binary Relations for Program Abstraction , 2002, The Essence of Computation.

[15]  Kim G. Larsen,et al.  A modal process logic , 1988, [1988] Proceedings. Third Annual Information Symposium on Logic in Computer Science.

[16]  Andrzhei︠a︡ Mostowski,et al.  Set theory : with an introduction to descriptive set theory , 1976 .

[17]  Anthony Hall,et al.  Correctness by Construction: Developing a Commercial Secure System , 2002, IEEE Softw..

[18]  Carla Piazza,et al.  Preserving ( Security ) Properties under Action Refinement ? , 2004 .