Skip to main content

Showing 1–8 of 8 results for author: Pantović, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2010.13925  [pdf, other

    cs.LO

    Precise Subtyping for Asynchronous Multiparty Sessions

    Authors: Silvia Ghilezan, Jovanka Pantović, Ivan Prokić, Alceste Scalas, Nobuko Yoshida

    Abstract: This paper presents the first formalisation of the precise subtyping relation for asynchronous multiparty sessions. We show that our subtyping relation is sound (i.e., guarantees safe process replacement) and also complete: any extension of the relation is unsound. To achieve our results, we develop a novel session decomposition technique, from full session types (including internal/external choic… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    ACM Class: F.3.2; F.3.3

  2. arXiv:1802.05863  [pdf, ps, other

    cs.PL

    A Calculus for Modeling Floating Authorizations

    Authors: Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira

    Abstract: Controlling resource usage in distributed systems is a challenging task given the dynamics involved in access granting. Consider, for instance, the setting of floating licenses where access can be granted if the request originates in a licensed domain and the number of active users is within the license limits, and where licenses can be interchanged. Access granting in such scenarios is given in t… ▽ More

    Submitted 16 February, 2018; originally announced February 2018.

  3. A Typed Model for Dynamic Authorizations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling. We build upon the pi-calculus so as to e… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    Journal ref: EPTCS 203, 2016, pp. 73-84

  4. Precise subtyping for synchronous multiparty sessions

    Authors: Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Nobuko Yoshida

    Abstract: The notion of subtyping has gained an important role both in theoretical and applicative domains: in lambda and concurrent calculi as well as in programming languages. The soundness and the completeness, together referred to as the preciseness of subtyping, can be considered from two different points of view: operational and denotational. The former preciseness has been recently developed with r… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

    Comments: In Proceedings PLACES 2015, arXiv:1602.03254

    ACM Class: D.3.3; F.3.2

    Journal ref: EPTCS 203, 2016, pp. 29-43

  5. Combining behavioural types with security analysis

    Authors: Massimo Bartoletti, Ilaria Castellani, Pierre-Malo Deniélou, Mariangiola Dezani-Ciancaglini, Silvia Ghilezan, Jovanka Pantovic, Jorge A. Pérez, Peter Thiemann, Bernardo Toninho, Hugo Torres Vieira

    Abstract: Today's software systems are highly distributed and interconnected, and they increasingly rely on communication to achieve their goals; due to their societal importance, security and trustworthiness are crucial aspects for the correctness of these systems. Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforc… ▽ More

    Submitted 8 October, 2015; originally announced October 2015.

    Journal ref: Journal of Logical and Algebraic Methods in Programming, Elsevier, 2015, pp.18

  6. On Compensation Primitives as Adaptable Processes

    Authors: Jovana Dedeić, Jovanka Pantović, Jorge A. Pérez

    Abstract: We compare mechanisms for compensation handling and dynamic update in calculi for concurrency. These mechanisms are increasingly relevant in the specification of reliable communicating systems. Compensations and updates are intuitively similar: both specify how the behavior of a concurrent system changes at runtime in response to an exceptional event. However, calculi with compensations and update… ▽ More

    Submitted 26 August, 2015; originally announced August 2015.

    Comments: In Proceedings EXPRESS/SOS 2015, arXiv:1508.06347

    ACM Class: F.3.2

    Journal ref: EPTCS 190, 2015, pp. 16-30

  7. Dynamic Role Authorization in Multiparty Conversations

    Authors: Silvia Ghilezan, Svetlana Jakšić, Jovanka Pantović, Jorge A. Pérez, Hugo Torres Vieira

    Abstract: Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at ru… ▽ More

    Submitted 25 August, 2014; originally announced August 2014.

    Comments: In Proceedings BEAT 2014, arXiv:1408.5564

    ACM Class: D.3.1; F.3.2

    Journal ref: EPTCS 162, 2014, pp. 1-8

  8. Session Type Isomorphisms

    Authors: Mariangiola Dezani-Ciancaglini, Luca Padovani, Jovanka Pantovic

    Abstract: There has been a considerable amount of work on retrieving functions in function libraries using their type as search key. The availability of rich component specifications, in the form of behavioral types, enables similar queries where one can search a component library using the behavioral type of a component as the search key. Just like for function libraries, however, component libraries will… ▽ More

    Submitted 13 June, 2014; originally announced June 2014.

    Comments: In Proceedings PLACES 2014, arXiv:1406.3313

    ACM Class: D.3.3, F.3.3

    Journal ref: EPTCS 155, 2014, pp. 61-71