Skip to main content

Showing 1–19 of 19 results for author: Horne, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.12187  [pdf, other

    cs.CR

    Brewer-Nash Scrutinised: Mechanised Checking of Policies featuring Write Revocation

    Authors: Alfredo Capozucca, Maximiliano Cristiá, Ross Horne, Ricardo Katz

    Abstract: This paper revisits the Brewer-Nash security policy model inspired by ethical Chinese Wall policies. We draw attention to the fact that write access can be revoked in the Brewer-Nash model. The semantics of write access were underspecified originally, leading to multiple interpretations for which we provide a modern operational semantics. We go on to modernise the analysis of information flow in t… ▽ More

    Submitted 28 May, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

  2. arXiv:2403.09961  [pdf, other

    physics.geo-ph cs.LG

    Thermal Earth Model for the Conterminous United States Using an Interpolative Physics-Informed Graph Neural Network (InterPIGNN)

    Authors: Mohammad J. Aljubran, Roland N. Horne

    Abstract: This study presents a data-driven spatial interpolation algorithm based on physics-informed graph neural networks used to develop national temperature-at-depth maps for the conterminous United States. The model was trained to approximately satisfy the three-dimensional heat conduction law by simultaneously predicting subsurface temperature, surface heat flow, and rock thermal conductivity. In addi… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: The thermal Earth model is made available as feature layers on ArcGIS at https://arcg.is/nLzzT0

  3. Provably Unlinkable Smart Card-based Payments

    Authors: Sergiu Bursuc, Ross Horne, Sjouke Mauw, Semen Yurkov

    Abstract: The most prevalent smart card-based payment method, EMV, currently offers no privacy to its users. Transaction details and the card number are sent in cleartext, enabling the profiling and tracking of cardholders. Since public awareness of privacy issues is growing and legislation, such as GDPR, is emerging, we believe it is necessary to investigate the possibility of making payments anonymous and… ▽ More

    Submitted 6 September, 2023; originally announced September 2023.

  4. arXiv:2304.06398  [pdf, ps, other

    cs.LO cs.DC cs.PL

    A Logical Account of Subty** for Session Types

    Authors: Ross Horne, Luca Padovani

    Abstract: We study the notion of subty** for session types in a logical setting, where session types are propositions of multiplicative/additive linear logic extended with least and greatest fixed points. The resulting subty** relation admits a simple characterization that can be roughly spelled out as the following lapalissade: every session type is larger than the smallest session type and smaller tha… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: In Proceedings PLACES 2023, arXiv:2304.05439

    Journal ref: EPTCS 378, 2023, pp. 26-37

  5. arXiv:2302.03778  [pdf

    cs.CY cs.ET

    Regulating trusted autonomous systems in Australia

    Authors: Rachel Horne, Tom Putland, Mark Brady

    Abstract: Australia is a leader in autonomous systems technology, particularly in the mining industry, borne from necessity in a geographically dispersed and complex natural environment. Increasingly advanced autonomous systems are becoming more prevalent in Australia, particularly as the safety, environmental and efficiency benefits become better understood, and the increasing sophistication of technology… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

    Comments: 12 pages

  6. arXiv:2210.08270  [pdf, other

    cs.CR cs.SI

    Assessing the Solid Protocol in Relation to Security & Privacy Obligations

    Authors: Christian Esposito, Olaf Hartig, Ross Horne, Chang Sun

    Abstract: The Solid specification aims to empower data subjects by giving them direct access control over their data across multiple applications. As governments are manifesting their interest in this framework for citizen empowerment and e-government services, security and privacy represent pivotal issues to be addressed. By analyzing the relevant legislation, notably GDPR, and international standards, nam… ▽ More

    Submitted 15 October, 2022; originally announced October 2022.

    Comments: under submission

  7. arXiv:2209.05231  [pdf, ps, other

    cs.LO cs.CR cs.DC cs.PL

    Bisimulations Respecting Duration and Causality for the Non-interleaving Applied $π$-Calculus

    Authors: Clément Aubert, Ross Horne, Christian Johansen

    Abstract: This paper shows how we can make use of an asynchronous transition system, whose transitions are labelled with events and which is equipped with a notion of independence of events, to define non-interleaving semantics for the applied $π$-calculus. The most important notions we define are: Start-Termination or ST-bisimilarity, preserving duration of events; and History-Preserving or HP- bisimilarit… ▽ More

    Submitted 6 September, 2022; originally announced September 2022.

    Comments: In Proceedings EXPRESS/SOS 2022, arXiv:2208.14777

    ACM Class: F.3.2; C.2.2

    Journal ref: EPTCS 368, 2022, pp. 3-22

  8. arXiv:2105.02029  [pdf, other

    cs.CR

    Unlinkability of an Improved Key Agreement Protocol for EMV 2nd Gen Payments

    Authors: Ross Horne, Sjouke Mauw, Semen Yurkov

    Abstract: To address known privacy problems with the EMV standard, EMVCo have proposed a Blinded Diffie-Hellman key establishment protocol, which is intended to be part of a future 2nd Gen EMV protocol. We point out that active attackers were not previously accounted for in the privacy requirements of this proposal protocol, and demonstrate that an active attacker can compromise unlinkability within a dista… ▽ More

    Submitted 22 June, 2022; v1 submitted 5 May, 2021; originally announced May 2021.

  9. arXiv:2104.14226  [pdf, other

    cs.LO

    Assuming Just Enough Fairness to make Session Types Complete for Lock-freedom

    Authors: Rob van Glabbeek, Peter Höfner, Ross Horne

    Abstract: We investigate how different fairness assumptions affect results concerning lock-freedom, a typical liveness property targeted by session type systems. We fix a minimal session calculus and systematically take into account all known fairness assumptions, thereby identifying precisely three interesting and semantically distinct notions of lock-freedom, all of which having a sound session type syste… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: To appear in the Proceedings of LICS 2021

    ACM Class: F.3.1; F.4.1; F.1.2; F.3.3

  10. arXiv:2104.06512  [pdf

    cs.RO cs.HC

    Trust and Safety

    Authors: S. K. Devitt, R. Horne, Z. Assaad, E. Broad, H. Kurniawati, B. Cardier, A. Scott, S. Lazar, M. Gould, C. Adamson, C. Karl, F. Schrever, S. Keay, K. Tranter, E. Shellshear, D. Hunter, M. Brady, T. Putland

    Abstract: Robotics in Australia have a long history of conforming with safety standards and risk managed practices. This chapter articulates the current state of trust and safety in robotics including society's expectations, safety management systems and system safety as well as emerging issues and methods for ensuring safety in increasingly autonomous robotics. The future of trust and safety will combine s… ▽ More

    Submitted 13 April, 2021; originally announced April 2021.

    Comments: Approved for publication as a chapter in 'Robotics Roadmap for Australia V2' by Robotics Australia Network [forthcoming]. 31 pages, 10 Figures, 1 table

    ACM Class: B.8.0; C.4; K.4.0; K.4.1; K.5.2

  11. An Analytic Propositional Proof System on Graphs

    Authors: Matteo Acclavio, Ross Horne, Lutz Straßburger

    Abstract: In this paper we present a proof system that operates on graphs instead of formulas. Starting from the well-known relationship between formulas and cographs, we drop the cograph-conditions and look at arbitrary undirected) graphs. This means that we lose the tree structure of the formulas corresponding to the cographs, and we can no longer use standard proof theoretical methods that depend on that… ▽ More

    Submitted 20 October, 2022; v1 submitted 2 December, 2020; originally announced December 2020.

    Journal ref: Logical Methods in Computer Science, Volume 18, Issue 4 (October 21, 2022) lmcs:6957

  12. Discovering ePassport Vulnerabilities using Bisimilarity

    Authors: Ross Horne, Sjouke Mauw

    Abstract: We uncover privacy vulnerabilities in the ICAO 9303 standard implemented by ePassports worldwide. These vulnerabilities, confirmed by ICAO, enable an ePassport holder who recently passed through a checkpoint to be reidentified without opening their ePassport. This paper explains how bisimilarity was used to discover these vulnerabilities, which exploit the BAC protocol - the original ICAO 9303 sta… ▽ More

    Submitted 1 June, 2021; v1 submitted 17 February, 2020; originally announced February 2020.

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 2 (June 2, 2021) lmcs:6117

  13. arXiv:1811.02536  [pdf, other

    cs.CR cs.LO

    A Bisimilarity Congruence for the Applied pi-Calculus Sufficiently Coarse to Verify Privacy Properties

    Authors: Ross Horne

    Abstract: This paper is the first thorough investigation into the coarsest notion of bisimilarity for the applied pi-calculus that is a congruence relation: open barbed bisimilarity. An open variant of labelled bisimilarity (quasi-open bisimilarity), better suited to constructing bisimulations, is proven to coincide with open barbed bisimilarity. These bisimilary congruences are shown to be characterised by… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

  14. arXiv:1705.10908  [pdf, other

    cs.LO

    Generating Witness of Non-Bisimilarity for the pi-Calculus

    Authors: Ki Yung Ahn, Ross Horne, Alwen Tiu

    Abstract: In the logic programming paradigm, it is difficult to develop an elegant solution for generating distinguishing formulae that witness the failure of open-bisimilarity between two pi-calculus processes; this was unexpected because the semantics of the pi-calculus and open bisimulation have already been elegantly specified in higher-order logic programming systems. Our solution using Haskell defines… ▽ More

    Submitted 30 May, 2017; originally announced May 2017.

  15. A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic

    Authors: Ki Yung Ahn, Ross Horne, Alwen Tiu

    Abstract: Open bisimilarity is defined for open process terms in which free variables may appear. The insight is, in order to characterise open bisimilarity, we move to the setting of intuitionistic modal logics. The intuitionistic modal logic introduced, called $\mathcal{OM}$, is such that modalities are closed under substitutions, which induces a property known as intuitionistic hereditary. Intuitionistic… ▽ More

    Submitted 9 August, 2021; v1 submitted 19 January, 2017; originally announced January 2017.

    ACM Class: F.4.1

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 3 (August 10, 2021) lmcs:4666

  16. De Morgan Dual Nominal Quantifiers Modelling Private Names in Non-Commutative Logic

    Authors: Ross Horne, Alwen Tiu, Bogdan Aman, Gabriel Ciobanu

    Abstract: This paper explores the proof theory necessary for recommending an expressive but decidable first-order system, named MAV1, featuring a de Morgan dual pair of nominal quantifiers. These nominal quantifiers called `new' and `wen' are distinct from the self-dual Gabbay-Pitts and Miller-Tiu nominal quantifiers. The novelty of these nominal quantifiers is they are polarised in the sense that `new' dis… ▽ More

    Submitted 15 January, 2020; v1 submitted 18 February, 2016; originally announced February 2016.

    Comments: Submitted for review 18/2/2016; accepted CONCUR 2016; extended version submitted to journal 27/11/2017

    ACM Class: F.4.1; F.1.1

    Journal ref: ACM Trans. Comput. Log. 20(4): 22:1-22:44 (2019)

  17. Local Type Checking for Linked Data Consumers

    Authors: Gabriel Ciobanu, Ross Horne, Vladimiro Sassone

    Abstract: The Web of Linked Data is the cumulation of over a decade of work by the Web standards community in their effort to make data more Web-like. We provide an introduction to the Web of Linked Data from the perspective of a Web developer that would like to build an application using Linked Data. We identify a weakness in the development stack as being a lack of domain specific scripting languages for… ▽ More

    Submitted 1 August, 2013; originally announced August 2013.

    Comments: In Proceedings WWV 2013, arXiv:1308.0268

    ACM Class: D.3.3

    Journal ref: EPTCS 123, 2013, pp. 19-33

  18. A Provenance Tracking Model for Data Updates

    Authors: Gabriel Ciobanu, Ross Horne

    Abstract: For data-centric systems, provenance tracking is particularly important when the system is open and decentralised, such as the Web of Linked Data. In this paper, a concise but expressive calculus which models data updates is presented. The calculus is used to provide an operational semantics for a system where data and updates interact concurrently. The operational semantics of the calculus also t… ▽ More

    Submitted 22 August, 2012; originally announced August 2012.

    Comments: In Proceedings FOCLASA 2012, arXiv:1208.4327

    ACM Class: F.1.2

    Journal ref: EPTCS 91, 2012, pp. 31-44

  19. arXiv:1108.0229  [pdf, ps, other

    cs.LO cs.NI cs.PL

    A Verified Algebra for Linked Data

    Authors: Ross Horne, Vladimiro Sassone

    Abstract: A foundation is investigated for the application of loosely structured data on the Web. This area is often referred to as Linked Data, due to the use of URIs in data to establish links. This work focuses on emerging W3C standards which specify query languages for Linked Data. The approach is to provide an abstract syntax to capture Linked Data structures and queries, which are then internalised in… ▽ More

    Submitted 31 July, 2011; originally announced August 2011.

    Comments: In Proceedings FOCLASA 2011, arXiv:1107.5847

    ACM Class: F.1.2, F.3.2

    Journal ref: EPTCS 58, 2011, pp. 20-33