Access Nets: Modeling Access to Physical Spaces
|
|
- Angela Harper
- 5 years ago
- Views:
Transcription
1 Acce Net: Modeling Acce to Phyical Space Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan Univerity of Colorado, Boulder, Colorado, USA Abtract. Electronic, oftware-managed mechanim uing, for example, radiofrequency identification (RFID) card, enable great flexibility in pecifying acce control policie to phyical pace. For example, acce right may vary baed on time of day or could differ in normal veru emergency ituation. With uch fine-grained control, undertanding and reaoning about what a policy permit become urpriingly difficult requiring knowledge of permiion level, patial layout, and time. In thi paper, we preent a formal modeling framework, called ACCESS NETS, uitable for decribing a combination of acce permiion, phyical pace, and temporal contraint. Furthermore, we provide evidence that model checking technique are effective in reaoning about phyical acce control policie. We decribe our reult from a tool that ue reachability analyi to validate ecurity policie. 1 Introduction Acce to phyical pace uch a building, mueum, airport, and chemical plant i increaingly mediated by electronic, oftware-controlled mechanim. Thee mechanim combine traditional human mediation, mechanical lock-and-key, a well a electronic technologie uch a radio-frequency identification (RFID) card. The ue of computerized acce control in thee ytem i on the rie, a they enable highly flexible policie. Computerized acce control policie enable adminitrator to add or remove acce to key peronnel or pecify policie that may vary depending on the time of the day (working hour veru evening), day of the week (weekday veru weekend), and month in the year (ummer veru fall). Thee policie can even be automatically changed in repone to emergencie uch a a fire in the building in contrat to acce policie mediated uing only mechanical lock-and-key. In thi paper, we addre formal modeling and verification of acce control policie for phyical pace. Our approach combine dynamic model of acce control policie in phyical pace with an application of model-checking technique. In particular, we make the following contribution: We preent a formal framework ACCESS NETS for the modeling of acce control in phyical pace, uch a office or building (Sect. 3). Our framework model the topology of the phyical pace, a well a the movement of peronnel with variou acce level in thi pace. Our model of acce control accommodate rich pecification, including thoe that depend on time.
2 2 Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan Gallery Lobby Archive Acce Level viitor guard curator P1 P2 P3 The viitor may only be in the mueum between 9:00 a.m. and 5:00 p.m. The viitor may only enter the archive with guard ecort during mueum hour. The curator may enter the mueum and the archive at any time. Fig. 1. A floor plan, acce control role (top) and acce control policy (bottom) for a mueum. We demontrate a new and compelling application oormal verification technique, like model checking. While oftware-managed acce control ytem may be large and complex, we ee that well-known tate-pace reduction technique are urpriingly effective in reducing the ize of the model. Thu, we identify a new domain where model checking technique are particularly apt (Sect. 4). We provide evidence for the applicability of our technique through an initial cae tudy (Sect. 5). In particular, we oberve that our ACCESS NET-pecific reduction technique are quite effective in reducing the tate pace. Motivating Example. Figure 1 outline a imple floor plan and an acce control policy for a fictitiou mueum. The mueum ha a main entrance leading into a lobby. The lobby in turn lead into a gallery, which i connected to an archive. The main entrance and the entrance to the archive have key card reader. The archive entrance i taffed by a guard during opening hour. The acce control policie are alo decribed in Fig. 1. Given uch a policy pecification, we wih to verify that the acce control mechanim upport it. For example, i it poible for a viitor to be in the archive after hour? Can curator acce the archive at any time? In general, it i hard to manually conider all the relevant cenario, epecially for larger building with more complex acce control policie. Therefore, we deire a formal framework that capture the relevant detail of uch ytem and enable automatic verification. 2 Overview In thi ection, we preent an overview of the main feature in the ACCESS NETS model, uing the mueum example hown in Fig. 1. Note that we are not intereted in detail like the precie patial layout of the building (e.g., coordinate). Thu, we eek a graphlike model that capture connectivity but abtract patial layout. Drawing inpiration from Petri net [19], we ue token to model peron and tranition to capture the movement of peron from one place to another. Each tranition ha at leat one incoming and one outgoing arc. Tranition move token one-way from their input place to their output place. Thi capture common ituation wherein, a key i needed to enter a room but not needed to exit. The ACCESS NET model for the mueum example ha the graph tructure hown in Fig. 2.
3 Acce Net: Modeling Acce to Phyical Space 3 main(in) gallery(in) archive(in) outide lobby gallery archive main(out) gallery(out) archive(out) Fig. 2. The graph tructure of the ACCESS NETS model for the example in Fig. 1. Token Type. Each token in our model ha an aociated type that repreent it acce level (e.g., viitor, guard, curator, adminitrator, or upervior). Tranition are enabled baed on the number of token of each type from each of their input place. For example, the rule that a viitor may only enter the archive under guard ecort (rule P2 in Fig. 1) i hown in Fig. 3. Both the incoming and outgoing arc of the archive(in) tranition are annotated with 1 guard and 1 viitor. Thee label pecify the enabling condition that there mut be a guard and a viitor preent in the gallery. Tranition Firing. Tranition whoe input condition are atified may fire nondeterminitically to yield a next tate baed on the output condition of the tranition. Thu, for example, to capture that a curator may enter the archive herelf without guard ecort (rule P3), we can imply add a eparate tranition with arc from the gallery and to the archive each labeled with 1 curator. Time. Some tranition rule depend on the time of day. For example, anyone may enter the mueum between 9:00 a.m. and 5:00 p.m. To model time, we add a global clock to an ACCESS NET tate and a et of time interval to the enabling condition of each tranition. For intance, we can aociate a et of time [9, 17] with the main(in) tranition in Fig. 3, o that it i enabled between 9:00 a.m. and 5:00 p.m. Mandatory Tranition. Recall that viitor may be in the mueum only between 9:00 a.m. and 5:00 p.m. (rule P1), o not only do we allow viitor to enter during thoe hour, but we mut require viitor to leave when the mueum cloe at 5:00 p.m. To do o, we introduce the notion of a mandatory tranition. At any tate, if any mandatory tranition i enabled, one of them mut be taken next (ee Sect. 3). In thi cenario, we add mandatory tranition from the archive, gallery, and lobby to the outide requiring the viitor to leave during the time range [17, 17.5] (i.e., 5:00 p.m. to 5:30 p.m.). 3 Acce Net In thi ection, we provide a formalization of ACCESS NETS. The formal model provide a bai for verification technique (Sect. 4) and the cae tudie (Sect. 5). Topology. The topology of a building i modeled uing a directed graph, whoe node include a et of place P and a et of tranition T. The arc, F (P T ) (T P ), connect place to tranition, and tranition back to place. The inet place tranition arc p P t T f F
4 4 Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan main(in) gallery(in) archive(in) 1 guard 1 guard 1 viitor 1 viitor outide [9,17] lobby gallery archive main(out) gallery(out) archive(out) Fig. 3. The ACCESS NET model from Fig. 2 with acce control pecified. box to the right ummarize the notation ued. The incoming arc for a tranition t indicate the place from which t remove token, and the outgoing arc indicate the place to which t add token (cf. Definition 3). Pictorially, place are denoted a circle and tranition a rectangle (cf. Fig. 2). type S marking m : (P S) N global time τ [τ min, τ max ] enabled time H : T P([τ min, τ max ]) tate σ = (m, τ) State: Acce Type, Marking, and Time. To model variou acce control role, each token i annotated with a type drawn from a et S. For example, in the mueum example dicued previouly, the et S i {viitor, guard, curator}, repreenting variou role. Peron are repreented by token of particular type (i.e., with particular acce role). A part of the tate, we decribe where people are with a marking. Definition 1 (Marking). A marking m i a function m : (P S) N that repreent the number of token of type in place p. Pictorially, a marking i denoted by drawing m(p, ) dot labeled at place p. To model temporal acce control rule, we introduce a global clock τ that i a value in a fixed range [τ min, τ max ]. For example, we may chooe τ min = 0 and τ max = 24 repreenting the hour of day. The framework i agnotic to tranlation of thee value to real time. Therefore, time can be modeled at the appropriate granularity (e.g., econd, minute, hour, and day). Time i updated in the ACCESS NET model by uing a pecial tick tranition. For each tranition t, we define the hour function H : T P([τ min, τ max ]). For implicity, H(t) i aumed to be the union oinitely many dijoint interval for each tranition t, pecifying the time intant during which the tranition t can be enabled (cf. Definition 2). Diagrammatically, H(t) i denoted by writing a range next to the tranition (e.g., [9, 17] in Fig. 3). The abence of uch an annotation indicate that the tranition i time independent (i.e., H(t) i [τ min, τ max ]). A tate σ of an ACCESS NET i then the pair (m, τ) coniting of it current marking and it current time. State Tranition. The execution of an ACCESS NET model the movement of people throughout the building and the progreion of time. Recall from Sect. 2 that our model contain mandatory tranition M T that are taken whenever enabled. Definition 2 decribe the enforcement of mandatory tranition.
5 Acce Net: Modeling Acce to Phyical Space 5 State tranition σ σ denote a move from current tate σ to a next tate σ. There are two main type of tate tranition: (1) token tranition model the movement of people, and (2) tick tranition model the progreion of time. Token Tranition. An ACCESS NET ha a weight function W : (F S) N that give the number of token of a type that move along each arc f during a tranition. Definition 2 (Enabled Tranition). Tranition t i enabled in tate σ = (m, τ) iff 1. The current time belong to the permiible range: τ H(t). 2. There are ufficiently many token in the input place: W (f, ) m(p, ) for all f : (p, t) in(t) and for all S. 3. If t / M, then every mandatory tranition t m M i not enabled. where in(t) = def {(p, t) F p P } and out(t) = def {(t, p) F p P } (i.e., the incoming and outgoing arc of tranition t, repectively). An enabled tranition can move token from it input place to it output place. Definition 3 (Token Tranition). Given tate σ = (m, τ) and enabled tranition t, a token tranition reult in a new marking m, uch that m (p, ) = m(p, ) W (f, ), S, f : (p, t) in(t). m (p, ) = m(p, ) + W (f, ), S, f : (t, p) out(t). For implicity in preentation, in(t) and out(t) are aumed dijoint, that i, there are no elf-loop. Self-loop can be eliminated by the introduction of dummy tranition and t place [19]. We write uch a token tranition a (m, τ) (m, τ). Tick Tranition. Tick tranition model the elape of time. For any tate σ = (m, τ) uch that τ [τ min, τ max ), and no mandatory tranition are enabled, the global time may progre to any time in (τ, τ ] where τ = min(τ M, τ max ) where τ M > τ i the next time when ome mandatory tranition could be enabled. We write a time tranition from τ to τ a follow: (m, τ) tick (m, τ ). When checking the model, not all time value τ need to be conidered. Intead, time i abtracted uing a region contruction along the line of Alur and Dill [1]. To implify ome oormalization, we alo define idling tranition that do not change the tate, which we write a σ ε σ. Execution. An execution of an ACCESS NET conit of a finite equence of tate σ 0, σ 1,..., σ n wherein each tate σ i+1 i obtained from the previou tate σ i by a legal tate tranition a decribed above. For example, we write a ample execution a t follow: σ 1 ε tick t 0 σ1 σ 2 n 1 σn. We conider finite equence of tate ince we are intereted in execution in which time remain within [τ min, τ max ]. However, temporal logic are interpreted over infinite tate equence (or tree) [5]. We extend our finite equence to infinite one by adding infinitely many idling tranition. Conervation. Since token repreent people, there i a phyical contraint that all tate tranition σ σ conerve the number and type of token. We enforce thi by requiring that all tranition t are conervative. Conervative tranition i not an inherent limitation to our approach but rather a check for more faithful model.
6 6 Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan Definition 4 (Conervative Tranition). A tranition t i conervative ifor every acce type, the um of token of that type on incoming edge to t i equal to the um of that type on outgoing edge, that i, for all S, W (f, ) = W (f, ). f in(t) f out(t) If all tranition are conervative, then any execution i alo conervative capturing the deired phyical contraint (ee our companion technical report [10] for a proof). For reference, we gather all of the piece of an ACCESS NET a decribed above in our companion technical report [10]. There are related Petri net model, e.g., with typed token [16] and with predicate on tranition [11]. Here, we have incorporated the apect that are critically neceary to capture acce control policie. 4 Verification of Acce Propertie In thi ection, we conider verifying propertie of ACCESS NETS. Our primary goal i to check whether token of a certain type can be preent in a certain room in a certain time range; for example, a property of interet could ay, There i never a viitor in the archive before 9:00 a.m. or after 5:30 p.m. Thi retricted cla of reachability propertie enable u to perform aggreive tate-pace reduction. It i poible to extend our reduction to verify ACTL propertie, following Clarke et al. [6]. Given an ACCESS NET A with a place p and a token type, we ay p i token reachable for at time τ if and only if σ 0 σ n where i the tranitive cloure of the tranition relation, tate σ 0 i the initial tate, and if σ n = (m n, τ n ) then m n (p, ) > 0 and τ n = τ. A expected, we can verify uch propertie uing model checking. The tate pace of an ACCESS NET blow up quickly a we increae the number of place, tranition, and token type, a we ee in our cae tudy (Sect. 5). Fortunately, there are everal natural reduction that can be performed that repect the token reachability property of interet. Our reduction generate a new ACCESS NET that abtract the original in the ene that it i ound with repect to token reachability. Stated more preciely, let A be a reduced ACCESS NET of A, and let π be the function mapping each place of A to it correponding place in A. Then, the reduction i ound with repect to token reachability if whenever π(p) i not reachable for at time τ in A, then p i not reachable for at time τ in A. In other word, reduction preerve afety. Furthermore, two of our three reduction, namely the unlocked door and redundant tranition reduction, are complete with repect to token reachability. The two mot intereting reduction ue the following procedure (cf. Clarke et al. [6]): (1) we define an equivalence relation pl over place; (2) we define a new AC- CESS NET A a the quotient of A with repect to. pl Definition 5 (Acce Net Reduction). Let A be an ACCESS NET and let pl be an equivalence relation over place. Thi equivalence relation induce the following equivalence relation over arc: ar f 1 f 2 iff pl p 1 p 2 and t 1 = t 2, and either f 1 = (p 1, t 1 ) and f 2 = (p 2, t 2 ) or f 1 = (t 1, p 1 ) and f 2 = (t 2, p 2 )
7 Acce Net: Modeling Acce to Phyical Space 7 Let π map a place or arc in A = (P, T,...) to it repective equivalence cla (under pl or ). ar We alo write π 1 for the pre-image of thi mapping. Then, A = (P, T,...) i a reduced ACCESS NET under equivalence relation : pl P = π(p ) F = π(f ) T = T M = M S = S τ 0 = τ 0 τ min = τ min τ max = τ max H = H W : (f, ) W (f, ) m 0 : (p, ) f π 1 ({f }) p π 1 ({p }) m 0 (p, ) where π(p ) i the image of P under π and π(f ) i the image of F under π. That i, we map all place and arc to their equivalence clae (firt line); tranition, mandatory tranition, token type, time contraint and the clock tay the ame; weight on arc and the initial marking are combined by umming the number of token of each type. It remain to be hown that A a defined above i actually an ACCESS NET. In particular, the main property that mut be checked i that conervation i preerved, which i hown in our companion technical report [10]. We now define everal reduction on ACCESS NETS that ue thi idea of defining equivalence relation over place. Unlocked Door Reduction. If the only barrier between two room i an unlocked door, then for the purpoe of checking reachability, the two room can be merged into a ingle room. Definition 6 (Equivalent up to Unlocked Door). A room p 2 can be reached through one unlocked door from a room p 1 p 2, written unlocked(p 1, p 2 ), if and only ior every ecurity role, there i ome tranition t uch that 1. We have H(t) = [τ min, τ max ], that i, the tranition i enabled at all time. 2. We have pred(t) = {p 1 } and ucc(t) = {p 2 } where pred and ucc are the function mapping a place to it et of predeceor and ucceor place, repectively. In other word, t i a tranition from p 1 to p 2 and doe not take token from or end token to any place other than p 1 and p 2. pl Two room p 1 and p 2 are equivalent up to unlocked door in one-tep, written p 1 1 p 2, if and only if unlocked(p 1, p 2 ) and unlocked(p 2, p 1 ). The equivalence relation for unlocked door i imply the reflexive-tranitive cloure of pl 1. Figure 4(a) how a implified ACCESS NET of the office building (ECOT) ued in our cae tudy (ee Sect. 5) with two token type and f (to repreent tudent and faculty, repectively). Figure 4(b) how the reult of applying the unlocked door reduction to Fig. 4(a). We ee that the two place hall 1 and hall 2 have been merged into a place [hall 1], a the two place allow free paage of both and f in both direction. After the unlocked door reduction, the reduced model technically would have unneceary elf-loop tranition between each new repreentative and itelf. Thee tranition can be deleted from the model.
8 8 Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan office 1 hall 1 hall 2 office 2 (a) Simplified ACCESS NET before any reduction. office 1 [hall 1] office 2 [office 1] [hall 1] (b) After the unlocked door reduction. (c) After equivalent room and redundant tranition reduction. Fig. 4. Applying reduction to a implified ACCESS NET for an office building. Redundant Tranition Reduction. If two tranition repreent identical acce rule and move token from the ame ource to the ame detination, then one of the two tranition can be deleted. Thi reduction doe not follow the pattern of defining an equivalence relation on place for the ake of merging place. Intead if two tranition are equivalent according to the following definition, then one of the tranition can be arbitrarily deleted. Definition 7 (Equivalent up to Redundant Tranition). Two tranition t 1 and t 2 are equivalent up to redundant tranition, written tr, iff: 1. H(t 1 ) = H(t 2 ), that i, the tranition are enabled at exactly the ame time. 2. There exit a bijective mapping µ : in(t 1 ) in(t 2 ) uch that for every place p 1 where (p 1, t 1 ) in(t 1 ), then whenever (p 2, t 2 ) = µ(p 1, t 1 ), we have: p 1 = p 2 and W ((p 1, t 1 ), ) = W ((p 2, t 2 ), ) for every S. 3. There exit a bijective mapping ν : out(t 1 ) out(t 2 ) uch that for every place p 1 where (t 1, p 1 ) out(t 1 ), then whenever (t 2, p 2 ) = ν(t 1, p 1 ), we have: p 1 = p 2 and W ((t 1, p 1 ), ) = W ((t 2, p 2 ), ) for every S. Thi definition ay that two tranition are equivalent if they are enabled at exactly the ame time and if their incoming and outgoing edge can be put into a bijective correpondence of equivalent edge. It i traightforward to how that tr i an equivalence relation. For each equivalence cla of tranition, all of the tranition in that cla can be deleted except for one arbitrary repreentative.
9 Acce Net: Modeling Acce to Phyical Space 9 Equivalent Room Reduction. If two room are equivalent in the ene that they are only reachable from the ame room according to the ame acce control rule, then the two room can be merged into a ingle room. Definition 8 (Equivalent Room). Firt, we define two tranition a being equivalent up to q 1 = q 2, written q1=q2 in the ame way a tr from the redundant tranition reduction with one change. Intead of requiring of µ and ν that p 1 = p 2, we require only that p 1 = p 2 or p 1 = q 1 and p 2 = q 2 or p 1 = q 2 and p 2 = q 1 That i, the tranition are redundant under an aumption that q 1 pl room q 1 and q 2 are equivalent room, denoted q 1 q 2 if and only if = q 2. Then two 1. There exit a bijective mapping µ : pred(q 1 ) pred(q 2 ) uch that for every tranition t pred(q 1 ), we have t q1=q2 µ(t). 2. There exit a bijective mapping ν : ucc(q 1 ) ucc(q 2 ) uch that for every tranition t ucc(q 1 ), we have t q1=q2 ν(t). It i traightforward to how that pl i an equivalence relation. Figure 4(c) how the reult of applying the equivalent room and redundant door reduction to Fig. 4(b). We ee that office 1 and office 2 have been merged into a ingle place [office 1]. Thee reduction correpond naturally to our intuition, a from the perpective of token reachability, all of the office and all of the hall look the ame a long a they are connected to each other though unlocked area. All three reduction, unlocked door, redundant tranition, and equivalent room, are ound with repect to token reachability. Furthermore, unlocked door and redundant tranition are complete with repect to token reachability (though equivalent room i not). Proof of thee fact are given in our companion technical report [10]. At a high-level, the reduction merge equivalent place that atify the ame et of propertie, in order to contruct an abtraction. Thi abtraction i imilar in way to canonical abtraction in the TVLA program analyi framework [22]. Untiming. Regarding tick tranition, the definition for tate tranition allow arbitrary time tep and decribe an infinite tate pace. However, only the the initial time and the boundarie of time interval referenced by time-dependent tranition need to be conidered during verification. To thi end, we apply a tandard untiming contruction a decribed in Alur and Dill [1]. The untiming contruction i epecially implified in the cae of ACCESS NETS ince the model ha a ingle timer. 5 Cae Study: Office Security To validate the feaibility of our approach, we modeled a part of the Engineering Center Office Tower (ECOT) at the Univerity of Colorado, Boulder and a et of ynthetic acce control rule. Furthermore, we have completely modeled an actual, large office building with multiple floor, occupied by many buinee uing a real acce control
10 10 Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan Table 1. Dependence of explicit-tate model checking uing Spin on the ize of the building for verifying a valid property. In each tet cae run, we how the ize of the ACCESS NET (number of room, tranition, and peron) along with the number tate oberved by Spin, the total memory ued by Spin, and the total time for the model checking to run. Model Room Tranition Peron State Memory (MB) Time () ECOT ECOT 7, ECOT 6,7, policy. With thee model, we applied explicit-tate model checking uing Spin [15] and bounded model checking [4] uing our implementation baed on the Yice SMT olver [8] (other verification technique could apply). With thi tudy, we are intereted in how the building and acce control policy i encoded a an ACCESS NET model and how feaible i model checking. We alo look at how much the tate pace can be reduced uing the technique from Sect. 4. To create our ACCESS NET model of ECOT, we examined CAD drawing of the ixth, eventh, and eighth floor of the building (which i where the Computer Science Department i located). The acce control policy involved three acce type, tudent, faculty, and maintenance and conited of the following rule: 1. Any faculty can enter any office. Anybody in an office can exit it. 2. Any maintenance can enter a mechanical room or janitorial room. Anybody in one of thee room can exit it. 3. Any tudent can only enter a conference room accompanied by a faculty and only between 9:00 a.m. and 5:00 p.m. Conference room can be exited freely. A perhap expected, the tate pace grow quickly even for our relatively mall model by either increaing the number of place and tranition or the number of token. Fortunately, the topology and acce policie that we work with are amenable to reduction, which apply regardle of model checking technique. We firt conider verification of a valid property uing Spin on unreduced model and look at the growth in verification reource a a function of model ize. Then, we look at the cot of dicovering property violation. We conider not only explicit-tate model checking but alo bounded model checking, which i inenitive to number of token. Finally, we look at the effectivene of reduction. Verifying Valid Propertie. Table 1 how the relationhip between the reource required for explicit-tate model checking and number of room and tranition in an ACCESS NET, while Table 2 conider the dependence on number of peron. All of our tet were executed on a Linux erver with 32 GB memory and ixteen 2.93GHz Intel Xeon X7350 CPU. In the tet run in thee two table, we checked that a tudent can never be in a particular office (826) and a faculty member can never be in a pecific mechanical room (805A), which i valid in thee model. There were no ue of time in any of thee model (i.e., we did not ue rule 3 regarding the conference room here). In Table 1, we ee that Spin work with reaonable memory and time contraint, but the tate pace blow up quite quickly a we add additional room (by ucceively
11 Acce Net: Modeling Acce to Phyical Space 11 Table 2. Dependence of explicit-tate model checking uing Spin on the number of peron in the model for verifying a valid property. We tarted with one peron of each type and then ucceively added one faculty at a time. Model Room Tranition Peron State Memory (MB) Time () ECOT ECOT ECOT ECOT ECOT adding the room on the 7th and 6th floor). In thee tet, we tarted one token of each type in a public room on the 8th floor. For increaing number of peron, we ee the number of tate conidered by Spin alo grow rapidly, a doe the increae in memory and time conumption, a hown in Table 2. In thee tet, we tarted with one token of each type and then ucceively added one token of type faculty at a time. We choe the faculty type, a it lead to the larget tate pace. Dicovering Property Violation. Both of the previou example checked propertie that could not be violated (and thu required an exhautive exploration of the tate pace). Here, we conider violated propertie. Firt, we conider the ame et of ACCESS NET model from Table 1 that do not ue timed tranition. The violated property wa a faculty member cannot be in a particular office on the 8th floor (826). The tet run are hown in the top half of Table 3. We then looked at a et of timed model that add the conference room rule (rule 3), that i, that a tudent can only enter a conference room with a faculty member between 9:00 a.m. and 5:00 p.m. In thi cae, the initial tate wa a tudent and a faculty on the 7th floor at 9:00 a.m. The violated property wa a tudent cannot be in the conference room (831) at 6:00 p.m. Thi property can be violated by the faculty letting the tudent into the conference room between 9:00 a.m. and 5:00 p.m. and then the tudent remaining in the room after 5:00 p.m. until 6:00 p.m. Table 2 how rapid exploion in the number of tate conidered by Spin a we increae the number of token. A potential advantage of bounded model checking i it inenitivity to number of token, and thu, we applied it to the property violation cae of Table 3. Table 4 preent thee reult. We confirm that the Yice-baed bounded model checker find the ame witnee a Spin in a reaonable amount of time and pace. Note that our BMC implementation i currently a prototype. Reduction. The redundant tructure of ECOT i particularly well-uited to the reduction decribed in Sect. 4. Even after adding in the 5th floor, ECOT reduce to jut four room! In the reduced model, there i one public room, one repreentative office, one repreentative maintenance room, and one repreentative conference room. Table 5 how the reult from the reduction; the memory and time meaurement how the cot of computing the reduced model. In all cae, after applying all reduction, the model are o mall that the model checking time are negligible (and thu not hown
12 12 Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan Table 3. Dicovering a property violation uing Spin in breadth-firt earch mode. We conider the et of ACCESS NET model without timed tranition from Table 1 and a new et with timed tranition. Model Room Tranition Peron State Memory Depth Time (MB) () Without Timed Tranition ECOT ECOT 7, ECOT 6,7, With Timed Tranition ECOT ECOT 7, Table 4. Dicovering a property violation uing the Yice-baed BMC (untimed model). Note that BMC doe not require a bound on the number of peron. Model Memory (MB) Time () Depth ECOT ECOT 7, ECOT 6,7, in the table). The row labeled ome reduction how the effect of performing only the unlocked door and redundant tranition reduction (Definition 6 and 7). The row labeled all reduction add the equivalent room reduction (Definition 8), which i all reduction decribed in Sect. 4. In our model, all faculty can acce all office, but in a light variant, we may have a unique acce policy for each office. In thi cae, the equivalent room reduction would have no effect giving reduced model analogou to the cae with ome reduction. Real-World Example. We alo obtained the complete acce control pecification for an actual four-tory, multi-tenant office building. The building houe roughly 200 employee during working hour. Our model of the building had about 200 room and 230 door. The operator of the building can aign up to 24 different acce type. Due to the exponential dependence of our model on the number of people in the model, we could not imulate all acce type at once. We elected two acce type that were more intereting and ran a imple licing reduction (not decribed in Sect. 4) that remove tranition for the excluded acce type. Without reduction, thi model i too large for the explicit-tate model checker, but the reduction are very effective (ee Table 6). After reduction, we can prove afety propertie very efficiently. Note that the retriction in the number of peron doe not apply to BMC that wa run for an unbounded number of peron. Thi make the BMC approach epecially appealing becaue the number of people in the model doe not directly affect the encoding ize. The BMC implementation ran for an hour on the full
13 Acce Net: Modeling Acce to Phyical Space 13 Table 5. Size of reduced model and reource requirement to calculate the reduction. The marking (<) indicate omething below the granularity of our meaurement, while (*) indicate a cae where we fail to run Spin poibly becaue of the model ize. Model Reduction Model Room Tranition Peron State Memory (MB) Time () ECOT 8 no reduction N/A N/A ome reduction < < all reduction < < ECOT 7, 8 no reduction N/A N/A ome reduction < 0.1 all reduction ECOT 6, 7, 8 no reduction N/A N/A ome reduction all reduction ECOT 5, 6, 7, 8 no reduction * N/A N/A ome reduction all reduction Table 6. Reult of explicit-tate model checking for real office building. Model Room Tranition Peron State Memory (MB) Time () before reduction N/A N/A N/A after reduction model without reduction, earching up to depth 7, but wa unable to find a violation. The running time on the reduced model wa ignificantly maller (30) for a depth Related Work Sampemane et al.preent a pecification formalim for role-baed acce control to phyical pace that allow novel ue of phyical pace, while enuring that reource in thee pace are not miued [23]. Similarly, Bauer et al.preent a framework for modeling and reaoning about peronnel credential and their delegation for phyical a well a cyber acce control uing theorem proving [3]. The previouly cited work preent formalization that upport the addition, deletion, and modification of acce control policie. Our work i complementary: we focu on modeling the phyical topology of the building and reaoning about it interplay with acce control mechanim.
14 14 Robert Frohardt, Bor-Yuh Evan Chang, and Sriram Sankaranarayanan Dynamical model of building have been invetigated both at the macrocopic level, wherein, pedetrian flow are often modeled a continuou, without ditinguihing the behavior of each individual pedetrian [14] and at microcopic level with an agentbaed model of individual action. Application of thee imulation have included technique to predict the time to evacuate large and complex building [18,13,24,21]. Thee model inevitably ue a graph-baed repreentation to capture the building topology. Our work offer a ytematic model that alo take into account the different acce level and the complex oftware-controlled acce policie that are virtually tandard in modern building. Model checking ha alo been applied in the pat to check acce control policy for computer network ytem. The model propoed here i imilar to the role-baed acce control (RBAC) model ued for mediating acce to electronic reource in an organization [9]. The verification of acce control policie for organizational ytem ha been conidered in the pat. For intance, Jha et al. [17] preent a formalization of variou RBAC model and characterize the computational complexity of ome analyi problem. Guelev et al.preent a model-checking approach for verifying both the permiivity a well a the ecurity of acce control policie [12]. Our work on phyical pace bear many imilaritie to role-baed acce control policie. For intance, our model aume that permiion are provided baed on certain well-defined organizational role, which can be finitely many and well-known a priori. However, the verification problem i inherently different. Unlike network topologie, building have a non-trivial patial layout, whoe modeling at the appropriate level of detail i critical. Furthermore, building tend to be larger with more room, door, paageway with a rich variety of acce enforcement mechanim. Building acce control rule vary with time unlike network acce control rule. Finally, the need for mandatory tranition i alo quite unique. Neverthele, a witneed by the ucce of our abtraction-baed approache, building alo preent large amount of regularity that can be exploited through imple reduction cheme to ignificantly reduce the complexity of property verification. Our work make ue of a tranlation to exiting model checking tool including Spin for explicit tate model checking [5,15], a well a a bounded model checker [4] implemented uing the SAT-modulo theory olver Yice [20,8]. Other fat SMT olver include olver uch a Z3 [7,2]. 7 Concluion Although we have focued on reachability propertie, we can conider ACCESS NETS that model and verify other apect of phyical pace. For example, other potential application include checking for detectability of violation (e.g., by adding obervability to the emantic) or modeling evacuation plan for building. In ummary, we have preented a formal model, ACCESS NETS, for analyzing acce control policie for phyical pace. The model can expre many apect that are relevant uch a phyical topology, role-baed acce policie, and time-dependent acce rule. Formal verification technique can be ued on thee model, thereby making computer-aided validation of acce control policie poible. Furthermore, we have demontrated that although the
15 Acce Net: Modeling Acce to Phyical Space 15 tate-pace doe explode, domain-pecific tate-pace reduction technique are quite effective in reducing the complexity of the verification problem. Acknowledgment. We thank the anonymou reviewer for their helpful comment. Reference 1. R. Alur and D. L. Dill. A theory of timed automata. Theor. Comput. Sci., 126(2), C. Barrett, M. Deter, A. Olivera, and A. Stump. Deign and reult of the third annual atifiability modulo theorie competition (SMT-Comp 2007). International Journal on Artificial Intelligence Tool, 17(4), L. Bauer, S. Garri, and M. K. Reiter. Efficient proving for practical ditributed accecontrol ytem. In Computer Security (ESORICS), A. Biere, A. Cimatti, E. Clarke, and Y. Zhu. Symbolic model checking without BDD. In Tool and Algorithm for the Contruction and Analyi of Sytem (TACAS), E. Clarke, O. Grumberg, and D. Peled. Model Checking E. M. Clarke, O. Grumberg, and D. E. Long. Model checking and abtraction. ACM Tran. Program. Lang. Syt., 16(5), L. de Moura and N. Bjørner. Z3: An efficient SMT olver. In Tool and Algorithm for the Contruction and Analyi of Sytem (TACAS), B. Dutertre and L. de Moura. The YICES SMT olver. tool-paper.pdf. 9. D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli. Role-baed Acce Control R. Frohardt, B.-Y. E. Chang, and S. Sankaranarayanan. Acce Net: Modeling acce to phyical pace (extended verion). Technical Report CU-CS , Department of Computer Science, Univerity of Colorado, Boulder, H. J. Genrich and K. Lautenbach. Sytem modelling with high-level Petri net. Theor. Comput. Sci., 13(1), D. P. Guelev, M. Ryan, and P.-Y. Schobben. Model-checking acce control policie. In Information Security (ISC), D. Helbing, I. Farka, and T. Vicek. Simulating dynamical feature of ecape panic. Nature, 407(6803), L. Henderon. The tatitic of crowd fluid. Nature, 229, G. Holzmann. The SPIN Model Checker K. Jenen. Coloured Petri net and the invariant-method. Theor. Comput. Sci., 14(3), S. Jha, N. Li, M. V. Tripunitara, Q. Wang, and W. H. Winborough. Toward formal verification of role-baed acce control policie. IEEE Tranaction on Dependable and Secure Computing (TDSC), 5(4), G. Lova. Modeling and imulation of pedetrian traffic flow. Tranportation Reearch B, 28(6), T. Murata. Petri net: Propertie, analyi and application. Proc. IEEE, 77(4), R. Nieuwenhui, A. Olivera, and C. Tinelli. Solving SAT and SAT modulo theorie: From an abtract DPLL procedure to DPLL(T). J. ACM, 53(6), N. Pelechano and A. Malkawi. Evacuation imulation model: Challenge in modeling high rie building evacuation with cellular automata approache. Automation in Contruction, 17(4), M. Sagiv, T. Rep, and R. Wilhelm. Parametric hape analyi via 3-valued logic. ACM Tran. Program. Lang. Syt., 24(3), G. Sampemane, P. Naldurg, and R. H. Campbell. Acce control for active pace. In Computer Security Application (ACSAC), T. Shen. ESM: A building evacuation imulation model. Building and Environment, 40(5), 2005.
The Process-Value Model: A Systems View of the IST Value Chain
Aociation for Information Sytem AIS Electronic Library (AISeL) SAIS 2007 Proceeding Southern (SAIS) 3-1-2007 The Proce-Value Model: A Sytem View of the IST Value Chain William L. Lomeron lomeronw@nula.edu
More informationThe research of simplified method of calculating wind and rain loads and its validation
The reearch of implified method of calculating wind and rain load and it validation Xing FU 1) and Hong-Nan LI 2) 1), 2) Faculty of Infratructure Engineering, Dalian Univerity of Technology, Dalian 116024,
More informationValue intensity of water used for electrical energy generation in the Western U.S.; an application of embedded resource accounting
Value intenity of water ued for electrical energy generation in the Wetern U.S.; an application of embedded reource accounting Elizabeth A. Martin and Benjamin L. Ruddell Abtract Thi tudy evaluate the
More informationINVESTIGATION OF THERMOSTAT-SET CONTROL AS A NEW DIRECT LOAD CONTROL METHOD
INVESTIGATION OF THERMOSTAT-SET CONTROL AS A NEW DIRECT LOAD CONTROL METHOD Canbolat Uçak canbolat@elk.itu.edu.tr Gökçe Dokuyucu gokce776@uperonline.com Department of Electrical Engineering Electrical
More informationEnabling Collaborative Data Sharing in Google+
Enabling Collaborative Data Sharing in Google+ Hongxin Hu Delaware State Univerity, Dover, Delaware, 19901 hxhu@au.edu Gail-Joon Ahn and Jan Jorgenen Arizona State Univerity, Tempe, Arizona, 85287 {gahn,jan.jorgenen}@au.edu
More informationA model for grain growth based on the novel description of dendrite shape
ARCHIVES of FOUNDRY ENGINEERING Publihed quarterly a the organ of the Foundry Commiion of the Polih Academy of Science ISSN (1897-3310) Volume 7 Iue 4/2007 183 188 36/4 A model for grain growth baed on
More informationCourse Evaluation Validation using Data Envelopment Analysis. Joseph Sarkis Clark University. Inshik Seol Clark University
THE ACCOUNTING EDUCATORS JOURNAL Volume XX 2010 pp. 21-32 Coure Evaluation Validation uing Data Envelopment Analyi Joeph Sarki Clark Univerity Inhik Seol Clark Univerity Abtract In thi paper we detail
More informationA Method to Risk Analysis in Requirement Engineering Using Tropos Goal Model with Optimized Candidate Solutions K.Venkatesh Sharma 1, Dr P.V.
www.ijcsi.org 250 A Method to Rik Analyi in Requirement Engineering Uing Tropo Goal Model with Optimized Candidate Solution K.Venkateh Sharma 1, Dr P.V.Kumar 2 1 Reearch Scholar in JNTUK Kakinada, Andhra
More informationHeterogeneity in Producer s Marketing Strategy
Heterogeneity in Producer Marketing Strategy Tong Zhang Reearch Aitant Department of Agricultural Economic Oklahoma State Univerity 42C Ag Hall Phone no. 405-744-9797 Email: tong.zhang0@oktate.edu Wade
More informationDiscovering Transcription Factor Binding Motif Sequences
Dicovering Trancription Factor Binding Motif Sequence I Department of Biology, Stanford Univerity, CA, 94305 Introduction In biology, equence motif are hort equence pattern, uually with fixed length, that
More information6/6/2012. HR Training and Development. Content. Training: concept. Training: concept. Training: concept. Training and Development: Concept
HR Training and Development UNIT 5 Content Concept and need of HR training and development Training need aement HR training: objective and method (on-the-job and off-the-job). Evaluation of training program
More informationBig Data computation for workshop-based planning support
Big Data computation for worhop-baed planning upport Jianguang Tu International School of Software Wuhan Univerity Wuhan, P.R.China Tujg1973@gmail.com Jianquan Cheng * School of Science and the Environment
More informationCONSTRUCTION SPECIFICATION FOR COMPACTING
ONTARIO PROVINCIAL STANDARD SPECIFICATION OPSS.MUNI 501 NOVEMBER 2017 CONSTRUCTION SPECIFICATION FOR COMPACTING TABLE OF CONTENTS 501.01 SCOPE 501.02 REFERENCES 501.03 DEFINITIONS 501.0 DESIGN AND SUBMISSION
More informationThe Use of Swimmer Bars as Shear Reinforcement in Reinforced Concrete Beam
American Journal of Engineering and Applied Science, 6 (1): 87-94, 2013 ISSN: 1941-7020 2014 M. Al-Nara et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene
More informationAggregate Supply. MPL i = Y i / L i
Aggregate Supply The upply of output depend on the behavior of producer. roducer' chooe the quantity of input to employ. Thee input produce output and we aume that producer chooe their input to maximize
More informationStudy on Mechanical Behavior of Thin-walled Member during Precision Straightening Process
2014 by IFSA Publihing, S. L. http://www.enorportal.com Study on Mechanical Behavior of Thin-walled Member during Preciion Straightening Proce Ben Guan, Yong Zang, Diping Wu, Qin Qin School of Mechanical
More informationInternational Journal of Mathematical Archive-8(6), 2017, Available online through ISSN
International Journal of Mathematical Archive-8(6), 27, 33-38 Available online through www.ijma.info ISSN 2229 546 BAYESIAN SPECIAL TYPE DOUBLE SAMPLING PLAN WITH BETA PRIOR DISTRIBTUTION Dr. S. JEYABHARATHI*
More informationMoST - Business Finland Joint Funding Call
MoST - Buine Finland Joint Funding Call I. AGREEMENT Memorandum of Undertanding for China-Finland Science & Technology Innovation Cooperation between the Department of International Cooperation of the
More informationAccommodating Transit in TRANSYT
68 TRANSPORTATON RESEARCH RECORD 1181 Accommodating Tranit in TRANSYT SAM YAGAR Although the TRANSYT traffic model imulate tranit vehicle in mixed traffic operation, it doe not adequately conider the effect
More informationBELIEF PROPAGATION REVEALS ALLOSTERIC MECHANISMS IN PROTEINS
BELIEF PROPAGATION REVEALS ALLOSTERIC MECHANISMS IN PROTEINS Hetunandan Kamietty Computer Science Department, Carnegie Mellon Univerity, Pittburgh, PA 15213, USA Email: hetu@c.cmu.edu Arvind Ramanathan
More informationSimultaneous Synthesis of Multi-Period Heat Exchanger Networks for Multi-Plant Heat Integration
757 A publication of CHEMICAL ENGINEERINGTRANSACTIONS VOL. 61 2017 Guet Editor:PetarSVarbanov Rongxin Su Hon Loong Lam Xia Liu Jiří J Klemeš Copyright 2017 AIDIC ServiziS.r.l. ISBN978-88-95608-51-8; ISSN
More informationUnit Commitment in Smart Grid Considering Demand Response and Stochastic Wind Generation
J. Energy Power Source Vol. 1, No. 6, 2014, pp. 314-320 Received: September 8, 2014, Publihed: December 30, 2014 Journal of Energy and Power Source www.ethanpublihing.com Unit Commitment in Smart Grid
More informationAbout the Authors. Your Shortcuts Might Become Expensive Detours. Dr. Andreas Krueger. Felipe Nogueira
L ea eadmi ni t r a onbynaki a MakeYourDeadl i newi t houtcompr omi i ngqual i t y I FRS16Rapi ddepl oymentgui de naki a. c om About the Author Dr. Andrea Krueger Andrea i a Senior Solution Expert for
More informationPRECIPITATION CALIBRATION TESTS August 12, 2009
BISHOP PAIUTE TRIBE ENVIRONMENTAL MANAGEMENT OFFICE PRECIPITATION CALIBRATION TESTS Augut 12, 2009 Thi report decribe the reult of everal precipitation calibration tet carried out in July 2009, following
More informationFINITE ELEMENT INVESTIGATION ON THE INTERACTION BETWEEN SHALLOW AND DEEP EXCAVATED TWIN TUNNELS
VOL. 13, NO. 1, JANUARY 18 ISSN 1819-668 6-18 Aian Reearch Publihing Network (ARPN). All right reerved. FINITE ELEMENT INVESTIGATION ON THE INTERACTION BETWEEN SHALLOW AND DEEP EXCAVATED TWIN TUNNELS Adel
More informationInternational Journal of Scientific & Engineering Research, Volume 5, Issue 8,August ISSN
International Journal of Scientific & Engineering Reearch, Volume 5, Iue 8,Augut-2014 310 Seimic Behavior of Concrete Column and Beam Reinforced with Interlocking Spiral Ioanni A. Tego, Theodoro A. Chryanidi,
More informationAfforestation Subsidy under Asymmetric Information and Transaction Cost in Developing Countries: Does rural capital market imperfection matter?
Afforetation Subidy under Aymmetric Information and Tranaction Cot in Developing Countrie: Doe rural capital market imperfection matter? Dambala Gelo, Steven Koch 2 Abtract Thi paper deal with the deign
More informationLED IP PRIMER. One World LED 1026 South Road, Edwardstown, SA, 5039 p: (08) e:
LED IP PRIMER Thi brochure provide a quick overview of the patented innovation by and our partner around the world. The ytem and method invented by patent granted to One World LED how our commitment to
More information75th MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Presentation
75th MORSS CD Cover Page UNCLASSIFIED DISCLOSURE FORM CD Preentation 712CD For office ue only 41205 12-14 June 2007, at US Naval Academy, Annapoli, MD Pleae complete thi form 712CD a your cover page to
More informationModeling Suspended Sediments in Dez Basin (Case Study: The Tale Zang Hydrometric Station)
International Reearch Journal of Applied and Baic Science. Vol., 3 (2), 402-407, 2012 Available online at http://www.irjab.com ISSN 2251-838X 2012 Modeling Supended Sediment in Dez Bain (Cae Study: The
More informationLogistics Service Level Improvement Research and Demonstration Based on Queuing Theory
Management cience and Engineering Vol. 5, No. 3,, pp. -54 DOI:.36/j.me.335X53.z44 IN 3-34[Print] IN 3-35X[Online] www.ccanada.net www.ccanada.org Logitic ervice Level Improvement Reearch and Demontration
More informationAn Optimal Real-time Pricing Algorithm for the Smart Grid: A Bi-level Programming Approach
An Optimal Real-time Pricing Algorithm for the Smart Grid: A Bi-level Programming Approach Fan-Lin Meng and Xiao-Jun Zeng School of Computer Science, Univerity of Mancheter Mancheter, United Kingdom mengf@c.man.ac.uk,
More informationManagement Science Letters
Management Science Letter 2 (202) 247 252 Content lit available at GrowingScience Management Science Letter homepage: www.growingscience.com/ml An empirical tudy to meaure the impact of loan aignment for
More informationChapter 4.4. Manure Application and Alberta s Agricultural Operation Practices Act (AOPA) learning objectives
Manure Application and Alberta Agricultural Operation Practice Act (AOPA) learning objective Identify manure incorporation requirement required by AOPA. Identify minimum etback ditance for manure application
More informationBachelor End Project: Characterization of the constitutive behavior of polymer foams
Bachelor End Project: Characterization of the contitutive behavior of polymer foam R. van Eijden MT 05.27 Coach: Dr. ir. J.A.W. van Dommelen Eindhoven, April 21t 2005 Content Content Abtract Lit of ymbol
More informationRESILIENT INFRASTRUCTURE June 1 4, 2016
RESILIENT INFRASTRUCTURE June 1 4, 2016 EXPERIMENTAL STUDY ON THE CAPACITY OF BARRIER DECK ANCHORAGE IN MTQ PL-3 BARRIER REINFORCED WITH HM-GFRP BARS WITH HEADED ENDS Michael Rotami Department of Civil
More informationarxiv: v2 [physics.soc-ph] 8 Oct 2009
Human group formation in online guild and offline gang driven by common team dynamic arxiv:082.2299v2 [phyic.oc-ph] 8 Oct 2009 Neil F. Johnon, Chen Xu 2,3, Zhenyuan Zhao, Nicola Ducheneaut 4, Nichola Yee
More informationAdaptive prediction model accuracy in the control of residential energy resources
Delft Univerity of Technology Delft Center for Sytem and Control Technical report 08-013 Adaptive prediction model accuracy in the control of reidential energy reource R.R. Negenborn, M. Houwing, B. De
More informationMARINE HEALTH, SAFETY, QUALITY, AND ENVIRONMENTAL MANAGEMENT
Guide for Marine Health, Safety, Quality and Environmental Management GUIDE FOR MARINE HEALTH, SAFETY, QUALITY, AND ENVIRONMENTAL MANAGEMENT AUGUST 2009 (Updated November 2010 ee next page) American Bureau
More informationReactive Power Management of a Wind Farm to Prevent Voltage Collapse of an Electric Power System
Reactive Power Management of a Wind Farm to Prevent Voltage Collape of an Electric Power Sytem R. M. Monteiro Pereira Intituto Superior Engenharia de Coimbra, Portugal rmfm@iec.pt C. M. Machado Ferreira
More informationChallenges of Developing ISO Sampling Standards
Challenge of Developing ISO Sampling Standard Ralph Holme CSIRO Mineral Down Under Flaghip Chair ISO/TC 10/SC 1 Sampling Iron Ore Chair ISO/TC 7/SC 4 Sampling Coal and Coke Convenor ISO/TC 183/WG 9 Sampling
More informationUse of Geographic Information Systems to Explore and Communicate Transportation and Land Use Relationships in Iowa
Ue of Geographic Information Sytem to Explore and Communicate Tranportation and Land Ue Relationhip in Iowa David J. Plazak, Tranportation Policy Analyt Mark B. elon, Tranportation Specialit Tim R. Strau,
More informationMARINE SAFETY, QUALITY AND ENVIRONMENTAL MANAGEMENT
GUIDE FOR MARINE SAFETY, QUALITY AND ENVIRONMENTAL MANAGEMENT JULY 2002 American Bureau of Shipping Incorporated by the Legilature of the State of New York 1862 Copyright 2002 American Bureau of Shipping
More informationJOURNAL OF THE. Agricultural Economics Council. L Northeastern 0,/IA-<- '-'-". ~. ' ) VOLUME Ill, NUMBER 2 OCTOBER 1974 NOV
C i.; ' I FOUNDI.\T!ON OF AGRICULTURAL ECONOMICS LIBRARY NOV 6 974 JOURNAL OF THE - L Northeatern Agricultural Economic Council ~ 0,/IA-
More informationExamining the tradeoff between fixed pay and performance-related pay: A choice experiment approach
Examining the tradeoff between fixed pay and performance-related pay: A choice experiment approach JUNYI SHEN * Reearch Intitute for Economic and Buine Adminitration, Kobe Univerity KAZUHITO OGAWA Faculty
More informationAvailable online at ScienceDirect. Energy Procedia 48 (2014 )
Available online at www.ciencedirect.com ScienceDirect Energy Procedia 48 (2014 ) 806 812 SHC 2013, International Conference on Solar Heating and Cooling for Building and Indutry September 23-25, 2013,
More informationEuropean Advertising Consumer Research Report 2015
RESEARCH REPORT European Advertiing Conumer Reearch Report 2015 Conumer Awarene & Impact of European Self-Regulatory Programme for OBA Independent reearch conducted by Ipo MORI on behalf of TRUSTe and
More informationBusiness-driven decision support for change management: planning and scheduling of changes
Buine-driven deciion upport for change management: planning and cheduling of change Jacque Sauvé 1, Rodrigo Rebouça 1, Antão Moura 1, Claudio Bartolini 2, Abdel Boulmakoul 3, David Tratour 3 1 Departamento
More informationSINCE the 1960s, conceptual models are in use to facilitate
IEEE TRNSTIONS ON SYSTEMS, MN, ND YBERNETIS PRT Study into the Factor that Influence the Undertandability of Buine Proce Model Hajo. Reijer and Jan Mendling btract Buine proce model are key artifact in
More informationGMACE Pilot #4: Adjusting the National Reliability Input Data
INTERBULL BULLETIN NO. 48. Berlin, Germany, May 20 21, 2014 GMACE Pilot #4: Adjuting the National Reliability Input Data P. G. Sullivan 1 and J. H. Jakoben 2 1 Canadian Dairy Network, Guelph, ON, Canada
More informationAs companies outsource more product design and manufacturing activities to other members of the supply
MANAGEMEN SCIENCE Vol. 55, No. 7, July 2009, pp. 1122 1138 in 0025-1909 ein 1526-5501 09 5507 1122 inform doi 10.1287/mnc.1090.1008 2009 INFORMS Quality Improvement Incentive and Product Recall Cot Sharing
More informationNotes on the GoldSim Plume Function
NAC-0036_R1 Note on the GoldSim Plume Function Augut 014 Prepared by John auxe NEPUNE AND COMPANY, INC. 1505 15 th St, Suite B, o Alamo, NM 87544 itle: Decription: hi document calculation detail of the
More informationModel of Integrated Production and Delivery Batch Scheduling Under JIT Environment to Minimize Inventory Cost
Proceeding of the 2014 International Conference on Indutrial Engineering and Operation Management Bali, Indoneia, January 7 9, 2014 Model of Integrated Production and Delivery Batch Scheduling Under JIT
More informationReliable Effects Screening: A Distributed Continuous Quality Assurance Process for Monitoring Performance Degradation in Evolving Software Systems
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 1 Reliable Effect Screening: A Ditributed Continuou Quality Aurance Proce for Monitoring Performance Degradation in Evolving Software Sytem Cemal Yilmaz, Adam
More informationComputer Analysis of In-plane Behavior of Masonry Walls Strengthened by FRP Strips
, 22-24 October, 2014, San Francico, USA Computer Analyi of In-plane Behavior of Maonry Wall Strengthened by FRP Strip J. Szolomicki Abtract The paper concern the trengthening uing FRP compoite of maonry
More informationM A S O N R Y. Revised Spring Engineering Notes For Design With Concrete Block Masonry
A S O N R Y Revied Spring 007 Engineering Note For Deign With Concrete Block aonry C H R O N I C L E S To rectify the ituation, the Spring 007 article i being reiued. We apologize for any inconvenience
More informationWorking Party on Agricultural Policies and Markets
Unclaified AGR/CA/APM(2001)24/FINAL AGR/CA/APM(2001)24/FINAL Unclaified Organiation de Coopération et de Développement Economique Organiation for Economic Co-operation and Development 22-Jul-2002 Englih
More informationIndicative simplified baseline and monitoring methodologies for selected small-scale CDM project activity categories
III.AU./Verion 01 TYPE III - OTHER PROJECT ACTIVITIES Project participant hall apply the general guideline to SSC CDM methodologie, information on additionality (attachment A to Appendix B) and general
More informationEquilibrium Sediment Transport and Evolution Trend Simulation of the Lower Yellow River
Senor & Tranducer, Vol. 21, Special Iue, May 213, pp. 135-141 Senor & Tranducer 213 by IFSA http://www.enorportal.com Equilibrium Sediment Tranport and Evolution Trend Simulation of the Lower Yellow River
More informationDecision makers and socializers, social networks and the role of individuals as participants
Tranportation (2013) 40:755 771 DOI 10.1007/11116-013-9465-6 Deciion maker and ocializer, ocial network and the role of individual a participant Kathleen Deutch Kontadino G. Goulia Publihed online: 1 May
More informationSocial group dynamics in networks
Social group dynamic in network Gergely Palla 1, Péter Pollner 1, Albert-Lázló Barabái 3 and Tamá Vicek 1,2 Abtract The rich et of interaction between individual in the ociety reult in complex community
More informationenvironment of the Poyang Lake of the department of Education, Nanchang University, Nanchang330031, China
doi:10.21311/002.31.10.20 Cot - Benefit Analyi of Green Building Baed on Input - Output Theory Liu Wei 1, 2, 3, Wu zhijiang 1 1 Eat China Jiaotong Univerity, Nanchang330013, China 2 The School of economic
More informationThe NearMe Wireless Proximity Server
UbiComp 2004. The Sixth International Conference on Ubiquitou Computing, pp. 283-300. September 7-10, 2004, Nottingham, England. The NearMe Wirele Proximity Server John Krumm and Ken Hinckley Microoft
More informationEffect of HFTID Controller on the Stability of Thermal Power Generator
Effect of HFTID Controller on the Stability of Thermal Power Generator Anhuman Sehgal, Japreet Kaur, Parveen Lehana 2 Department of Electrical Engineering, Baba Banda Singh Bahadur Engineering College,
More informationAn Image Retargeting Scheme with Content-based Cropping and Local Significance Aware Seam Carving
Proceeding of APSIPA Annual Summit and Conference 2015 16-19 December 2015 An Image Retargeting Scheme with Content-baed Cropping and Local Significance Aware Seam Carving Po-Chyi Su, Yung-Chieh Chou Dept.
More informationModal Response of Hydraulic Turbine Runners
1 (9) Modal Repone o Hydraulic Turbine Runner Q.W. LIANG Center o Indutrial Diagnotic and Fluid Dynamic (CDIF), Technical Univerity o Catalonia, Barcelona, Spain, quanwei@m.upc.edu C. G. RODRIGUEZ Center
More informationConcurrent Design Facility System Requirements Document
CDF DOCUMENT document title/ titre du document Concurrent Deign Facility Sytem Requirement Document Prepared by/préparé par Ro Henderon reference/réference iue/édition 1 reviion/réviion 1 date of iue/date
More informationcenturio.work - Modular Secure Manufacturing Orchestration
centurio.work - Modular Secure Manufacturing Orchetration Florian Pauker, Juergen Mangler, Stefanie Rinderle-Ma, Chritoph Pollak Autrian Comptetence Center for Digital Production, Vienna, Autria, {juergen.mangler,
More informationEnhanced Biofilter Treatment of Urban Stormwater by Optimizing the Hydraulic Residence Time in the Media
Enhanced Biofilter Treatment of Urban Stormwater by Optimizing the Hydraulic Reidence Time in the Media Redahegn Silehi 1, Robert Pitt 2 and Shirley Clark 3 1 Graduate tudent, Dept. of Civil, Contruction,
More informationSEISMIC STRENGTHENING OF COLUMNS BY ADDING NEW CONCRETE. Stephanos E. Dritsos 1
49 SEISMIC STRENGTHENING OF COLUMNS BY ADDING NEW CONCRETE Stephano E. Drito 1 ABSTRACT Placing reinforced concrete jacket or layer to trengthen or repair and trengthen concrete column i a normal contruction
More informationEstablishment and evaluation of operation function model for cascade hydropower station
Water Science and Engineering, 2010, 3(4):443-453 doi:10.3882/j.in.1674-2370.2010.04.007 http://www.waterjournal.cn e-mail: we2008@vip.163.com Etablihment and evaluation o operation unction model or cacade
More informationMaintaining ISO Compliance in Automated Procedures
Maintaining ISO 1705 Compliance in Automated Procedure Preenter & Author: Jorge Martin Fluke Corporation PO 9090 M/S 6-30 Everett, WA, USA 9806 Phone: (45) 446 6477; Fax: (45) 446 6390 Email: jmartin@flukecom
More informationExperimental Investigation of Sediment Trap Efficiency in Reservoirs
ENGINEER - Vol. XLVII, No. 0, pp. [1-8], 014 The Intitution of Engineer, Sri Lanka Experimental Invetigation of Sediment Trap Efficiency in Reervoir N.M.T.K. Revel, L.P.G.R. Ranairi, R.M.C.R.K. Rathnayake
More informationVEHICLE DISPATCHING PROBLEM AT THE CONTAINER TERMINAL WITH TANDEM LIFT QUAY CRANES. A Dissertation YAO XING
VEHICLE DISPATCHING PROBLEM AT THE CONTAINER TERMINAL WITH TANDEM LIFT QUAY CRANES A Diertation by YAO XING Submitted to the Office of Graduate Studie of Texa A&M Univerity in partial fulfillment of the
More informationTowards Planning and Execution for Information Retrieval
Toward Planning and Execution for Information Retrieval Laurie S. Hiyakumoto and Manuela M. Veloo Computer Science Department Carnegie Mellon Univerity Pittburgh, PA, USA 523 hyaku, mmv @c.cmu.edu Abtract
More informationLevel control of small intake reservoir in hydraulic system with long and complex penstock - Implemented level control at Toro 3 HPP
September 013 Page 1 Level control of mall intake reervoir in hydraulic ytem with long and complex pentock - Implemented level control at Toro 3 PP Damir Dolenc, Mitja Klopčar, Jernej Mazij Litotroj Power,
More informationAbstract. 1 Introduction
Automatic conflict detection and reolution in metrorail ytem: evaluation approach for MARCO EU project G.F. D'Addio, M. Mazzucchelli, S. Savio Dipartimento di Ingegneria Elettrica, Univerita di Genova,
More informationMathematical Modeling of Bioremediation of Soil Contaminated With Spent Motor Oil
Journal of Emerging Trend in Engineering and Applied Science (JETEAS) 3 (4): 654-659 Scholarlink Reearch Intitute Journal, 1 (ISSN: 141-716) jetea.cholarlinkreearch.org Journal of Emerging Trend in Engineering
More informationKNOWLEDGE MAPPING IN THAI WEAVING INDUSTRY
KNOWLEDGE MAPPING IN THAI WEAVING INDUSTRY Anyanitha Ditanont College of Innovation, Thammaat Univerity, Thailand anyanitha@yahoo.com Abtract: Knowledge i a valuable aet to any organiation epecially, the
More informationToP Strategic Planning Design Pattern Application Level
The Big Picture ToP Strategic Planning Deign Pattern Application Level ToP Strategic Planning Overview The ToP Strategic Planning method enable a group to create a et of trategie and practical action plan
More informationAntonio Di Paolo Universitat Autònoma de Barcelona & IEB
SCHOOL COMPOSITION EFFECTS IN SPAIN Antonio Di Paolo Univeritat Autònoma de Barcelona & IEB Abtract: Drawing on the PISA 2006 data et, thi tudy examine the impact of chool ocio-economic compoition on the
More informationSegregation-of-duties conflicts in the insider threat landscape: an overview and case study
Segregation-of-dutie conflict in the inider threat landcape: an overview and cae tudy Citation: Balletero, Sherwin, Pan, Lei, Batten, Lynn and Li, Gang 2015, Segregation-of-dutie conflict in the inider
More informationA Morphing Extrusion Die for Manufacturing of Thermoplastic Hoses THESIS
A Morphing Extruion Die for Manufacturing of Thermoplatic Hoe THESIS Preented in Partial Fulfillment of the Requirement for the Degree Mater of Science in the raduate School of The Ohio State Univerity
More informationProgramme title: Master of Science in Human Resource Management (CIPD) MSc (top up): 1 year (part time) April 2018
Programme Specification Faculty of Management, Law and Social Science Programme title: Mater of Science in Human Reource Management (CIPD) Academic Year: 2018/19 Degree Awarding Body: Final and interim
More informationReview of Previous Lists and Methods of Selection
Appendixe Appendix A Review of Previou it and ethod of Selection ot lit of trategic material are baed, implicitly at leat, on the two trand of criticality and vulnerability. A 1981 report by the Congreional
More informationSoftware Reverse Engineering Tool for Object Oriented Programming
Software Revere Engineering Tool for Object Oriented Programming D.M.Thakore Department of Computer Engineering Bharati vidyapeeth Deemed Univerity College of Engineering, Pune-43, Maharahtra, India S.J.Sarde
More informationManagement Science Letters
Management Science Letter 2 (2012) 3049 3054 Content lit available at GrowingScience Management Science Letter homepage: www.growingscience.com/ml Identification and prioritization of hazardou material
More informationEffectiveness and Exergy Destruction Analysis of Evaporator in Organic Rankine Cycle
Effectivene and Exergy Detruction Analyi of Evaporator in Organic Rankine Cycle Kyoung Hoon Kim, and Chul Ho Han Abtract---Thi paper carrie out a performance analyi baed on the firt and econd law of thermodynamic
More information3.4 BUTT FUSION WELDING
3.4 BUTT FUSION 3.4.1 INTRODUCTION The butt welding proce conit of the joining of two component (pipe and/or fitting) of equal diameter and thickne in which the urface to be welded are heated until melting
More informationExergy Analysis of Organic Rankine Cycle with Internal Heat Exchanger
International Journal of Material, Mechanic and Manufacturing, Vol. 1, No. 1, February 21 Exergy Analyi of Organic Rankine Cycle with Internal Heat Exchanger Kyoung Hoon Kim, Hyung Jong Ko, and Se Woong
More informationEssential Questions Content Skills Vocabulary
Principle of Engineering (21.0122) (Taught) Ditrict High School > 2016-2017 > Intermediate > Technology & Engineering > Principle of Engineering (21.0122) (Taught) > Byrom, Tony; Watt, Milton Monday, December
More informationCACHE Modules on Energy in the Curriculum: Fuel Cells
Abtract CACHE Module on Energy in the Curriculum: Fuel Cell In thi paper we demontrate how new technologie, in thi cae fuel cell, can be rapidly infued into the chemical engineering curriculum. Coure pecific
More informationTargeting Multiple Management Objectives in Sustainable Fisheries
Journal of Management and Sutainability; Vol. 4, No. 3; 2014 ISSN 1925-4725 E-ISSN 1925-4733 Publihed by Canadian Center of Science and Education Targeting Multiple Management Objective in Sutainable Fiherie
More informationprofessional quest 360 Feedback Reports
Survey Deign, Ditribution & Analyi Software profeional quet 360 Feedback Report Package Content Thi reporting package contain a jut a few of the many report that could be ued to analye a 360 degree feedback
More informationLand-Surface Models, Page 1
Land-Surface Model Introduction A land-urface model mut be able to accurately depict the interaction of the atmophere with the underlying urface land a well a the interaction of the ub-urface, or ubtrate,
More informationAddress for Correspondence
Reearch Paper ENERGY CONSERVATION IN MUD HOUSE AS COMPARED TO BRICK WALL BUILDING IN INDIA Subhah Mihra 1, Dr. J A Umani 2 Addre for Correpondence 1 Ph.d Scholar, 2 Profeor, Department of Mechanical Engineering,
More information(12) United States Patent (10) Patent No.: US 6,738,641 B1
UOO6738641B1 (12) United tate Patent (10) Patent No.: U 6,738,641 B1 Elaer (45) Date of Patent: May 18, 2004 (54) DITRIBUTED TRANCEIVER FOR 6,366,771 B1 * 4/2002 Angle et al.... 455/414.1 WIRELE COMMUNICATION
More informationSEIMIC RETROFIT PROGRAM FOR TAIWAN SCHOOL BUILDINGS AFTER 1999 CHI-CHI EARTHQUAKE
October 1-17, 008, Beijing, China SEIMIC RETROFIT PROGRAM FOR TAIWAN SCHOOL BUILDINGS AFTER 1999 CHI-CHI EARTHQUAKE Keh-Chyuan Tai 1 and Shyh-Jiann Hwang 1 Profeor, Dept. of vil ENG, National Taiwan Univerity,
More informationItem Aggregates and Price Elasticity
Seoul Journal of Buine Volume 16, Number 1 (June 2010) Item Aggregate and Price Elaticity INSEONG SONG *1) Seoul National Univerity Seoul, Korea Abtract Thi tudy provide analytical reult on the ytematic
More information