Safety enforcement via programmable strategies in Maude
This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model transformation that leverages the newly defined Maude strategy language for ensuring rich safety policies in non-deterministic programs. The transfo...
Saved in:
Published in | Journal of logical and algebraic methods in programming Vol. 132; p. 100849 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Inc
01.04.2023
|
Subjects | |
Online Access | Get full text |
ISSN | 2352-2208 |
DOI | 10.1016/j.jlamp.2023.100849 |
Cover
Loading…
Abstract | This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model transformation that leverages the newly defined Maude strategy language for ensuring rich safety policies in non-deterministic programs. The transformed system is guaranteed to comply with user-defined invariants that are expressed in a strategy-based, pattern-matching logic, thus preventing the concurrent system to reach any unsafe states. The performance and scalability of the technique is empirically evaluated and benchmarked on a set of realistic programs. |
---|---|
AbstractList | This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model transformation that leverages the newly defined Maude strategy language for ensuring rich safety policies in non-deterministic programs. The transformed system is guaranteed to comply with user-defined invariants that are expressed in a strategy-based, pattern-matching logic, thus preventing the concurrent system to reach any unsafe states. The performance and scalability of the technique is empirically evaluated and benchmarked on a set of realistic programs. |
ArticleNumber | 100849 |
Author | Ballis, D. Sapiña, J. Alpuente, M. Escobar, S. Galán, D. |
Author_xml | – sequence: 1 givenname: M. surname: Alpuente fullname: Alpuente, M. email: alpuente@upv.es organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain – sequence: 2 givenname: D. orcidid: 0000-0002-1048-1739 surname: Ballis fullname: Ballis, D. email: demis.ballis@uniud.it organization: DMIF, University of Udine, Via delle Scienze, 206, Udine, 33100, Italy – sequence: 3 givenname: S. surname: Escobar fullname: Escobar, S. email: sescobar@upv.es organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain – sequence: 4 givenname: D. surname: Galán fullname: Galán, D. email: dgalan@upv.es organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain – sequence: 5 givenname: J. surname: Sapiña fullname: Sapiña, J. email: jsapina@upv.es organization: VRAIN, Universitat Politècnica de València, Camino de Vera s/n, Apdo 22012, Valencia, 46071, Spain |
BookMark | eNp9j8tOwzAQRb0oEqX0C9jkBxLG46RxFixQxaNSEQtgbTmTSeWoecgOlfr3pIQ1q5Gu5lzdcyMWXd-xEHcSEglyc98kzdG2Q4KAakpAp8VCLFFlGCOCvhbrEBqA6VXnWsmlyD9szeM54q7uPXHL3RidnI0G3x-8bVtbHjkKo7cjHxyHyHXRm_2u-FZc1fYYeP13V-Lr-elz-xrv319228d9TFKrMSZCypRSeSUVlDJnSSChQNqwqkkXFUrKUijtFGtE5hS1zCzWCjC1yGol1NxLvg_Bc20G71rrz0aCuSibxvwqm4uymZUn6mGmeJp2cuxNIMcdceU802iq3v3L_wAtCGNA |
Cites_doi | 10.1016/j.scico.2013.07.014 10.1016/j.mex.2019.10.035 10.1023/B:LISP.0000029449.57959.bd 10.1016/j.jlamp.2016.03.001 10.1016/j.scico.2009.03.003 10.1016/j.jss.2019.03.061 10.1016/0304-3975(92)90182-F |
ContentType | Journal Article |
Copyright | 2023 Elsevier Inc. |
Copyright_xml | – notice: 2023 Elsevier Inc. |
DBID | AAYXX CITATION |
DOI | 10.1016/j.jlamp.2023.100849 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
ExternalDocumentID | 10_1016_j_jlamp_2023_100849 S2352220823000032 |
GrantInformation_xml | – fundername: ERDF A way of making Europe – fundername: Generalitat Valenciana grantid: PROMETEO/2019/098 funderid: https://doi.org/10.13039/501100003359 – fundername: Horizon 2020 grantid: 952215 funderid: https://doi.org/10.13039/100010661 – fundername: MCIN/AEI/10.13039/501100011033 grantid: PID2021-122830OB-C42 |
GroupedDBID | --M 0R~ 4.4 457 4G. 7-5 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAXUO AAYFN ABBOA ABMAC ABVKL ABXDB ABYKQ ACDAQ ACGFS ACRLP ADBBV ADEZE AEBSH AEKER AENEX AFKWA AFTJW AGHFR AGUBO AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD AXJTR BKOJK BLXMC EBS EFJIC EFLBG EJD FDB FIRID FYGXN GBLVA GBOLZ HZ~ KOM M41 NCXOZ O9- OAUVE RIG ROL SPC SPCBC SSV SSZ T5K ~G- AATTM AAXKI AAYWO AAYXX ABJNI ACVFH ADCNI ADVLN AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c183t-cc2c53337d130b17e1c01092c6e3fc89d21c540bac01822ee42815a2f3024a2e3 |
IEDL.DBID | AIKHN |
ISSN | 2352-2208 |
IngestDate | Tue Jul 01 00:37:50 EDT 2025 Fri Feb 23 02:38:53 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Maude Rewriting logic Formal methods Rewriting strategies Program safety |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c183t-cc2c53337d130b17e1c01092c6e3fc89d21c540bac01822ee42815a2f3024a2e3 |
ORCID | 0000-0002-1048-1739 |
ParticipantIDs | crossref_primary_10_1016_j_jlamp_2023_100849 elsevier_sciencedirect_doi_10_1016_j_jlamp_2023_100849 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | April 2023 2023-04-00 |
PublicationDateYYYYMMDD | 2023-04-01 |
PublicationDate_xml | – month: 04 year: 2023 text: April 2023 |
PublicationDecade | 2020 |
PublicationTitle | Journal of logical and algebraic methods in programming |
PublicationYear | 2023 |
Publisher | Elsevier Inc |
Publisher_xml | – name: Elsevier Inc |
References | Alpuente, Ballis, Frechina, Sapiña (br0130) 2016; 85 Alpuente, Cuenca-Ortega, Escobar, Meseguer (br0170) 2016; vol. 10184 Roldán, Durán, Vallecillo (br0020) 2009; 74 Alpuente, Ballis, Sapiña (br0040) 2019; 153 Alpuente, Ballis, Sapiña (br0030) 2019; 6 (br0110) 2022 TeReSe (br0050) 2003 Durán, Eker, Escobar, Martí-Oliet, Meseguer, Rubio, Talcott (br0080) 2020; 110 Logozzo, Ball (br0180) 2012 Vazou, Seidel, Jhala (br0150) 2014 Meseguer (br0060) 1992; 96 Alpuente, Ballis, Romero (br0120) 2014; 81 Jiang, Ren, Xiong, Zhang (br0090) 2019 Khoo, Shi (br0160) 2004; 17 Rubio (br0190) 2022; vol. 13252 Alpuente, Ballis, Baggi, Falaschi (br0100) 2010 Puebla, Bueno, Hermenegildo (br0140) 2000; vol. 1817 Rubio, Martí-Oliet, Pita, Verdejo (br0010) 2021; 123 Clavel, Durán, Eker, Escobar, Lincoln, Martí-Oliet, Meseguer, Rubio, Talcott (br0070) 2022 Vazou (10.1016/j.jlamp.2023.100849_br0150) 2014 Meseguer (10.1016/j.jlamp.2023.100849_br0060) 1992; 96 Logozzo (10.1016/j.jlamp.2023.100849_br0180) 2012 Alpuente (10.1016/j.jlamp.2023.100849_br0040) 2019; 153 Khoo (10.1016/j.jlamp.2023.100849_br0160) 2004; 17 Clavel (10.1016/j.jlamp.2023.100849_br0070) 2022 Rubio (10.1016/j.jlamp.2023.100849_br0190) 2022; vol. 13252 Alpuente (10.1016/j.jlamp.2023.100849_br0130) 2016; 85 Alpuente (10.1016/j.jlamp.2023.100849_br0170) 2016; vol. 10184 Alpuente (10.1016/j.jlamp.2023.100849_br0030) 2019; 6 Rubio (10.1016/j.jlamp.2023.100849_br0010) 2021; 123 Jiang (10.1016/j.jlamp.2023.100849_br0090) 2019 Alpuente (10.1016/j.jlamp.2023.100849_br0120) 2014; 81 Durán (10.1016/j.jlamp.2023.100849_br0080) 2020; 110 Roldán (10.1016/j.jlamp.2023.100849_br0020) 2009; 74 Puebla (10.1016/j.jlamp.2023.100849_br0140) 2000; vol. 1817 TeReSe (10.1016/j.jlamp.2023.100849_br0050) 2003 Alpuente (10.1016/j.jlamp.2023.100849_br0100) 2010 |
References_xml | – start-page: 255 year: 2019 end-page: 266 ident: br0090 article-title: Inferring program transformations from singular examples via big code publication-title: 34th IEEE/ACM International Conference on Automated Software Engineering – volume: 110 year: 2020 ident: br0080 article-title: Programming and symbolic computation in Maude publication-title: J. Log. Algebraic Methods Program. – start-page: 133 year: 2012 end-page: 146 ident: br0180 article-title: Modular and verified automatic program repair publication-title: Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA 2012) – volume: 81 start-page: 79 year: 2014 end-page: 107 ident: br0120 article-title: A rewriting logic approach to the formal specification and verification of web applications publication-title: Sci. Comput. Program. – volume: 123 year: 2021 ident: br0010 article-title: Strategies, model checking and branching-time properties in Maude publication-title: J. Log. Algebraic Methods Program. – volume: vol. 10184 start-page: 3 year: 2016 end-page: 20 ident: br0170 article-title: Partial evaluation of order-sorted equational programs modulo axioms publication-title: Proceedings of the 26th International Symposium on Logic-Based Program Synthesis and Transformation (LOPSTR 2016) – volume: vol. 13252 start-page: 274 year: 2022 end-page: 294 ident: br0190 article-title: Maude as a library: an efficient all-purpose programming interface publication-title: Proceedings of the 14th International Workshop on Rewriting Logic and Its Applications – volume: 96 start-page: 73 year: 1992 end-page: 155 ident: br0060 article-title: Conditional rewriting logic as a unified model of concurrency publication-title: Theor. Comput. Sci. – year: 2022 ident: br0070 article-title: Maude Manual (Version 3.2.1) – volume: 85 start-page: 707 year: 2016 end-page: 736 ident: br0130 article-title: Debugging Maude programs via runtime assertion checking and trace slicing publication-title: J. Log. Algebraic Methods Program. – volume: vol. 1817 start-page: 273 year: 2000 end-page: 292 ident: br0140 article-title: Combined static and dynamic assertion-based debugging of constraint logic programs publication-title: Proceedings of the 9th International Symposium on Logic-Based Program Synthesis and Transformation LOPSTR – volume: 17 start-page: 93 year: 2004 end-page: 128 ident: br0160 article-title: Program adaptation via output-constraint specialization publication-title: High.-Order Symb. Comput. – volume: 74 start-page: 812 year: 2009 end-page: 835 ident: br0020 article-title: Invariant-driven specifications in Maude publication-title: Sci. Comput. Program. – volume: 6 start-page: 2577 year: 2019 end-page: 2583 ident: br0030 article-title: Imposing assertions in Maude via program transformation publication-title: MethodsX – volume: 153 start-page: 64 year: 2019 end-page: 85 ident: br0040 article-title: Static correction of Maude programs with assertions publication-title: J. Syst. Softw. – year: 2003 ident: br0050 article-title: Term Rewriting Systems – start-page: 43 year: 2010 end-page: 52 ident: br0100 article-title: A fold/unfold transformation framework for rewrite theories extended to CCT publication-title: Proceedings of the 19th ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2010) – year: 2022 ident: br0110 – start-page: 39 year: 2014 end-page: 51 ident: br0150 article-title: Liquid Haskell: experience with refinement types in the real world publication-title: Proceedings of the 2014 ACM SIGPLAN Symposium on Haskell – start-page: 255 year: 2019 ident: 10.1016/j.jlamp.2023.100849_br0090 article-title: Inferring program transformations from singular examples via big code – start-page: 133 year: 2012 ident: 10.1016/j.jlamp.2023.100849_br0180 article-title: Modular and verified automatic program repair – volume: 110 year: 2020 ident: 10.1016/j.jlamp.2023.100849_br0080 article-title: Programming and symbolic computation in Maude publication-title: J. Log. Algebraic Methods Program. – volume: 81 start-page: 79 year: 2014 ident: 10.1016/j.jlamp.2023.100849_br0120 article-title: A rewriting logic approach to the formal specification and verification of web applications publication-title: Sci. Comput. Program. doi: 10.1016/j.scico.2013.07.014 – volume: 6 start-page: 2577 year: 2019 ident: 10.1016/j.jlamp.2023.100849_br0030 article-title: Imposing assertions in Maude via program transformation publication-title: MethodsX doi: 10.1016/j.mex.2019.10.035 – volume: vol. 10184 start-page: 3 year: 2016 ident: 10.1016/j.jlamp.2023.100849_br0170 article-title: Partial evaluation of order-sorted equational programs modulo axioms – volume: vol. 13252 start-page: 274 year: 2022 ident: 10.1016/j.jlamp.2023.100849_br0190 article-title: Maude as a library: an efficient all-purpose programming interface – volume: 17 start-page: 93 issue: 1 year: 2004 ident: 10.1016/j.jlamp.2023.100849_br0160 article-title: Program adaptation via output-constraint specialization publication-title: High.-Order Symb. Comput. doi: 10.1023/B:LISP.0000029449.57959.bd – year: 2022 ident: 10.1016/j.jlamp.2023.100849_br0070 – volume: vol. 1817 start-page: 273 year: 2000 ident: 10.1016/j.jlamp.2023.100849_br0140 article-title: Combined static and dynamic assertion-based debugging of constraint logic programs – volume: 123 year: 2021 ident: 10.1016/j.jlamp.2023.100849_br0010 article-title: Strategies, model checking and branching-time properties in Maude publication-title: J. Log. Algebraic Methods Program. – start-page: 43 year: 2010 ident: 10.1016/j.jlamp.2023.100849_br0100 article-title: A fold/unfold transformation framework for rewrite theories extended to CCT – volume: 85 start-page: 707 year: 2016 ident: 10.1016/j.jlamp.2023.100849_br0130 article-title: Debugging Maude programs via runtime assertion checking and trace slicing publication-title: J. Log. Algebraic Methods Program. doi: 10.1016/j.jlamp.2016.03.001 – start-page: 39 year: 2014 ident: 10.1016/j.jlamp.2023.100849_br0150 article-title: Liquid Haskell: experience with refinement types in the real world – volume: 74 start-page: 812 issue: 10 year: 2009 ident: 10.1016/j.jlamp.2023.100849_br0020 article-title: Invariant-driven specifications in Maude publication-title: Sci. Comput. Program. doi: 10.1016/j.scico.2009.03.003 – year: 2003 ident: 10.1016/j.jlamp.2023.100849_br0050 – volume: 153 start-page: 64 year: 2019 ident: 10.1016/j.jlamp.2023.100849_br0040 article-title: Static correction of Maude programs with assertions publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2019.03.061 – volume: 96 start-page: 73 issue: 1 year: 1992 ident: 10.1016/j.jlamp.2023.100849_br0060 article-title: Conditional rewriting logic as a unified model of concurrency publication-title: Theor. Comput. Sci. doi: 10.1016/0304-3975(92)90182-F |
SSID | ssj0001687831 |
Score | 2.23753 |
Snippet | This work aims to provide a general mechanism for safety enforcement in rewriting logic computations. Our technique relies on an assertion-guided model... |
SourceID | crossref elsevier |
SourceType | Index Database Publisher |
StartPage | 100849 |
SubjectTerms | Formal methods Maude Program safety Rewriting logic Rewriting strategies |
Title | Safety enforcement via programmable strategies in Maude |
URI | https://dx.doi.org/10.1016/j.jlamp.2023.100849 |
Volume | 132 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NSwMxEA2lvXjxW6xf5ODRUDfpZnePpViq0l5qobeQTSawBdeiW8F_72Q3iwriweMGBsLbZN4keTNDyDUHmaVxJlmEdMaQoYCl7hZPKdY6k-TcxHWG3Gwup8vhwypedci4zYXxssrg-xufXnvrMDIIaA42RTFYcB878PqlyEf26Id7XGQSl3ZvdP84nX9dtcg0SevOhN6EeZu2_lCt9Foj9r50JRdeM5D6spq_cdQ33pnsk90QMNJRM6cD0oHykOy1zRho2JtHJFloB9UHBZ9fZOpLP_peaBoEWM8-RYq-VW1lCFqUdKa3Fo7JcnL3NJ6y0BWBGdx-FTMGARRCJBbpJ48SiIx_3uJGgnAmzSyPDIZhucZhZH8APGBEseZOIB1rDuKEdMuXEk4JtUM3tEabyOEpTOc6NSCsr7_uhANk-j65aXFQm6b4hWpVYWtVw6Y8bKqBrU9ki5X68Q8Vuue_DM_-a3hOdvxXo6S5IN3qdQuXGCRU-VVYBJ8yVbkK |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5Ke9CLb7E-9-DRULPbPHosxZLax6Ut9LZs9gEpmBZNBf-9s8kGFcSD1w0D4Ut2vpndmW8A7qkOe3HQCz0f6cxDhtJebB4xS1HKyCilMig75KazMFl2n1fBqgGDuhfGllU631_59NJbu5WOQ7OzzbLOnNrYgZY3RTayRz_csupUQRNa_dE4mX0dtYRxFJeTCa2JZ21q_aGy0muN2FvpSspszUBsZTV_46hvvDM8ggMXMJJ-9U7H0ND5CRzWwxiI25unEM2F0cUH0ba_SJaHfuQ9E8QVYL3YFinyVtTKECTLyVTslD6D5fBpMUg8NxXBk7j9Ck9KBJAxFimkn9SPtC_t9RaVoWZGxj1FfYlhWCpwGdlfa0ww_EBQw5COBdXsHJr5JtcXQFTXdJUU0jeYhYlUxFIzZfXXDTMamb4NDzUOfFuJX_C6KmzNS9i4hY1XsLUhrLHiP74hR_f8l-Hlfw3vYC9ZTCd8MpqNr2DfPqmqaq6hWbzu9A0GDEV6636IT_bsu_A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Safety+enforcement+via+programmable+strategies+in+Maude&rft.jtitle=Journal+of+logical+and+algebraic+methods+in+programming&rft.au=Alpuente%2C+M.&rft.au=Ballis%2C+D.&rft.au=Escobar%2C+S.&rft.au=Gal%C3%A1n%2C+D.&rft.date=2023-04-01&rft.pub=Elsevier+Inc&rft.issn=2352-2208&rft.volume=132&rft_id=info:doi/10.1016%2Fj.jlamp.2023.100849&rft.externalDocID=S2352220823000032 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2352-2208&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2352-2208&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2352-2208&client=summon |