Skip to main content

Showing 1–4 of 4 results for author: Koleini, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1902.09636  [pdf, other

    cs.DC

    Fractal: Automated Application Scaling

    Authors: Masoud Koleini, Carlos Oviedo, Derek McAuley, Charalampos Rotsos, Anil Madhavapeddy, Thomas Gazagnaire, Magnus Skejgstad, Richard Mortier

    Abstract: To date, cloud applications have used datacenter resources through manual configuration and deployment of virtual machines and containers. Current trends see increasing use of microservices, where larger applications are split into many small containers, to be developed and deployed independently. However, even with the rise of the devops movement and orchestration facilities such as Kubernetes, t… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

  2. arXiv:1401.4730  [pdf, other

    cs.LO cs.CR

    Verification of agent knowledge in dynamic access control policies

    Authors: Masoud Koleini, Eike Ritter, Mark Ryan

    Abstract: We develop a modeling technique based on interpreted systems in order to verify temporal-epistemic properties over access control policies. This approach enables us to detect information flow vulnerabilities in dynamic policies by verifying the knowledge of the agents gained by both reading and reasoning about system information. To overcome the practical limitations of state explosion in model-ch… ▽ More

    Submitted 19 January, 2014; originally announced January 2014.

    Comments: The original version of this paper, "Model checking agent knowledge in dynamic access control policies", appeared in Lecture Notes in Computer Science (LNCS), Volume 7795, 2013, pp 448-462

  3. arXiv:1401.4492  [pdf, ps, other

    cs.LO

    Temporal Logics for Hyperproperties

    Authors: Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez

    Abstract: Two new logics for verification of hyperproperties are proposed. Hyperproperties characterize security policies, such as noninterference, as a property of sets of computation paths. Standard temporal logics such as LTL, CTL, and CTL* can refer only to a single path at a time, hence cannot express many hyperproperties of interest. The logics proposed here, HyperLTL and HyperCTL*, add explicit and s… ▽ More

    Submitted 20 January, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

  4. arXiv:1306.5678  [pdf, ps, other

    cs.LO cs.CR

    A Temporal Logic of Security

    Authors: Masoud Koleini, Michael R. Clarkson, Kristopher K. Micinski

    Abstract: A new logic for verification of security policies is proposed. The logic, HyperLTL, extends linear-time temporal logic (LTL) with connectives for explicit and simultaneous quantification over multiple execution paths, thereby enabling HyperLTL to express information-flow security policies that LTL cannot. A model-checking algorithm for a fragment of HyperLTL is given, and the algorithm is implemen… ▽ More

    Submitted 9 July, 2013; v1 submitted 24 June, 2013; originally announced June 2013.