ebook img

Application and Theory of Petri Nets and Concurrency: 43rd International Conference, PETRI NETS 2022, Bergen, Norway, June 19–24, 2022, Proceedings PDF

398 Pages·2022·22.045 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Application and Theory of Petri Nets and Concurrency: 43rd International Conference, PETRI NETS 2022, Bergen, Norway, June 19–24, 2022, Proceedings

Luca Bernardinello Laure Petrucci (Eds.) Application and Theory 8 8 2 of Petri Nets 3 1 S C and Concurrency N L 43rd International Conference, PETRI NETS 2022 Bergen, Norway, June 19–24, 2022 Proceedings Lecture Notes in Computer Science 13288 FoundingEditors GerhardGoos KarlsruheInstituteofTechnology,Karlsruhe,Germany JurisHartmanis CornellUniversity,Ithaca,NY,USA EditorialBoardMembers ElisaBertino PurdueUniversity,WestLafayette,IN,USA WenGao PekingUniversity,Beijing,China BernhardSteffen TUDortmundUniversity,Dortmund,Germany MotiYung ColumbiaUniversity,NewYork,NY,USA Moreinformationaboutthisseriesathttps://link.springer.com/bookseries/558 · Luca Bernardinello Laure Petrucci (Eds.) Application and Theory of Petri Nets and Concurrency 43rd International Conference, PETRI NETS 2022 Bergen, Norway, June 19–24, 2022 Proceedings Editors LucaBernardinello LaurePetrucci UniversityofMilano-Bicocca Paris13University Milano,Italy Villetaneuse,France ISSN 0302-9743 ISSN 1611-3349 (electronic) LectureNotesinComputerScience ISBN 978-3-031-06652-8 ISBN 978-3-031-06653-5 (eBook) https://doi.org/10.1007/978-3-031-06653-5 ©SpringerNatureSwitzerlandAG2022 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface This volume collects the proceedings of the 43rd International Conference on Application and Theory of Petri Nets and Concurrency (Petri Nets 2022). This series of conferences serves as an annual meeting place to discuss progress in the field of Petri nets and related models of concurrency. These conferences provide a forum for researcherstopresentanddiscussbothapplicationsandtheoreticaldevelopmentsinthis area.Noveltoolsandsubstantialenhancementstoexistingtoolscanalsobepresented. PetriNets2022includedasessiondevotedtotheApplicationofConcurrencytoSystem Design(ACSD),whichwasinthepastaseparateevent.Thefinalselectionforthistrack wasmadebyJörgDeselandAlexYakovlev.TheeventwasorganizedbytheSoftware EngineeringResearchGroupattheWesternNorwayUniversityofAppliedSciencesand tookplaceatCampusBergen,Norway. AftertwoeditionsentirelyheldonlinebecauseoftheSARS-Cov-2pandemic,this year theconference took place inthe traditionalstyle,gathering people inBergen, on thewesterncoastofNorway.Onbehalfoftheauthorsandparticipants,weexpressour deepestthankstotheOrganizingCommittee,chairedbyLarsMichaelKristensenand VioletKaIPun,forthetimeandeffortinvestedintheorganizationofthisevent.Thisyear, 35papersweresubmittedtoPetriNets2022byauthorsfrom18differentcountries.Each paperwasreviewedbyatleastthreereviewers.Thediscussionphaseandfinalselection processbytheProgramCommittee(PC)weresupportedbytheEasyChairconference system.Fromregularpapersandtoolpapers,thePCselected19papersforpresentation: 16regularpapers(withthreepapersontheACSDtrack)andthreetoolpapers.Afterthe conference,someoftheseauthorswereinvitedtosubmitanextendedversionoftheir contributionforconsiderationinaspecialissueofajournal. WethankthePCmembersandotherreviewersfortheircarefulandtimelyevaluation of the submissions and the fruitful constructive discussions that resulted in the final selectionofpapers.TheSpringerLNCSteamprovidedexcellentandwelcomesupport inthepreparationofthisvolume.ThekeynotepresentationsweregivenbyPauloEsteves- Verissimo(CarlAdamPetridistinguishedlecture)VolkerDiekert,andMariekeHuisman. AlongsidePetriNets2022,thefollowingworkshopsandeventstookplace:the12th editionoftheModelCheckingContest(MCC2022),AlgorithmsandTheoriesforthe Analysis of Event Data (ATAED 2022), Petri Nets and Software Engineering (PNSE 2022),andtheInternationalHealthDataWorkshop(HEDA2022). WehopeyouenjoyreadingthecontributionsinthisLNCSvolume. June2022 LaurePetrucci LucaBernardinello Organization ProgramCommittee ElvioGilbertoAmparore UniversityofTurin,Italy AbelArmasCervantes UniversityofMelbourne,Australia PaoloBaldan UniversitàdiPadova,Italy BenoîtBarbot UniversitéParis-EstCréteil,France LucaBernardinello(Co-chair) UniversitàdegliStudidiMilano-Bicocca,Italy DidierBuchs UniversityofGeneva,Switzerland BéatriceBérard LIP6,SorbonneUniversitéandCNRS,France JosepCarmona UniversitatPolitècnicadeCatalunya,Spain DaviddeFrutosEscrig UniversidadComplutensedeMadrid,Spain JörgDesel FernUniversitätinHagen,Germany RaymondDevillers ULB,Belgium SusannaDonatelli UniversitàdiTorino,Italy JavierEsparza TechnicalUniversityofMunich,Germany StefanHaar InriaandLSV,ENSParis-Saclay,France XudongHe FloridaInternationalUniversity,USA LoïcHelouet Inria,France RyszardJanicki McMasterUniversity,Canada AnnaKalenkova UniversityofAdelaide,Australia JörgKeller FernUniversitätinHagen,Germany EkkartKindler TechnicalUniversityofDenmark,Denmark MichaelKöhler-Bußmeier UniversityofAppliedScienceHamburg, Germany IrinaLomazova NationalResearchUniversityHigherSchoolof Economics,Russia RobertLorenz UniversityofAugsburg,Germany ŁukaszMikulski NicolausCopernicusUniversity,Poland AndrewMiner IowaStateUniversity,USA MarcoMontali FreeUniversityofBozen-Bolzano,Italy LaurePetrucci(Co-chair) UniversitéParis13,France ArtemPolyvyanyy UniversityofMelbourne,Australia Pierre-AlainReynier Aix-MarseilleUniversité,France ArnaudSangnier IRIF,UniversitéParisCitéandCNRS,France NataliaSidorova TechnischeUniversiteitEindhoven, TheNetherlands JacovandePol AarhusUniversity,Denmark viii Organization BoudewijnvanDongen EindhovenUniversityofTechnology, TheNetherlands AlexYakovlev NewcastleUniversity,UK AdditionalReviewers Adobbati,Federica Morard,Damien Balasubramanian,A.R. Nesterov,Roman Barylska,Kamila Oualhadj,Youssouf Bashkin,Vladimir Padoan,Tommaso Chatain,Thomas Petrak,Lisa Claeys,Emmanuelle Remke,Anne Coet,Aurélien Rivkin,Andrey Czerner,Philipp Rykaczewski,Krzysztof DeWeerdt,Jochen Schalk,Patrizia Igor,Khmelnitsky Sekerinski,Emil Julvez,Jorge Shershakov,Sergey Koutny,Maciej Verbeek,Eric Invited Talks Assumptions in Computer Science: Mere Mathematical Hypotheses, or Representations of the Physical World? PauloEsteves-Verissimo KAUST,CEMSE,RC3(ResilientComputingandCybersecurityCenter) Thuwal,KingdomofSaudiArabia The praxis of algorithm or mechanism design, especially in concurrent or distributed systems, mandates clear statements of the assumptions underlying the design, such as topology, dimension, synchrony, performance, threats, etc. The design—say, of an algorithmwhosebehaviourisdefinedbyasetofproperties(safety,liveness)—isthen showncorrectbydemonstratingitdoessecurethoseproperties,giventheassumptions. Fromamathematicalviewpoint,wearedone.Weneverask:arethehypothesesvalid? Ifwewishthealgorithmtohaveanyrealworldimpact,itmightbeadvisabletodefine an abstract system credibly materializing the assumptions made, where the protocol implementedfromthealgorithmwillruncorrectly.However,thisapparentdetailcom- pletelychangestheperspective:inessence,theprotocolcorrectnessbecomesconditional tothelikelihoodoftheassumptionsbeingmet,insuchasystem. Suddenly, we must look at our assumptions from a physics viewpoint: How do I achieve perfect failure detection in an asynchronous environment? Why would an attackercompromisecertainunitsandnotothersinanotherwisearbitraryfailureenvi- ronment?Weshouldnotbemistakenaboutthesebeing“implementationdetails”.They canandshouldbeaddressedassystemstheory problems,relatedtothesubstanceand therobustnessofassumptions—i.e.,thecoverageofthemappingoftheabstractsystem ontothephysicalworld. The rise of malicious threats to systems has been showing the importance of this argumentation. The practice of accepted deviations of some assumptions from phys- ical reality, in face of accidental (stochastic) threats, completely crumbled in face of malicious(intentional)threats,exposingtheirlackofsubstanceand/orrobustness.Para- phrasingandextendingmycolleagueandfriendFredSchneider’squotesomeyearsago: “Every[non-substantiated]assumptionisavulnerability”. Inthetalk,Iwilldelveintomanifestationsoftheproblemsabove,andapproachesto solvetheminasatisfactoryway.Closingthesegapsimplieseffortonsomeangles,and Iwillsingle-outtwo:(i)systemarchitectureanddesign;(ii)modelingandverification. I will be discussing: system awareness (topology-, context-, hybridisation-), logical vs.physicalcentralisation,trustvs.trustworthiness);system-levelimpossibilityresults, lowerboundsandsafetypredicates(coverage-stability,no-contamination,exhaustion- safety)denyingsubstancetosomecommonlymadeassumptions—orprovidingguidance toachieveit.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.