Task-Structured Probabilistic I/O Automata

Size: px
Start display at page:

Download "Task-Structured Probabilistic I/O Automata"

Transcription

1 Task-Strctred Probabilistic I/ Atomata Ran Canetti Ling Cheng Dilsn Kaynar Moses Liskov Nancy Lynch livier Pereira Roberto Segala IBM TJ atson Research Center USA Radbod University of Nijmegen the Netherlands MIT CSAIL USA The College of illiam and Mary USA Université Catholiqe de Lovain Belgim Università di Verona Italy Abstract Modeling frameorks sch as Probabilistic I/ Atomata (PIA) and Markov Decision Processes permit both probabilistic and nondeterministic choices In order to se sch frameorks to express claims abot probabilities of events one needs mechanisms for resolving the nondeterministic choices For PIAs nondeterministic choices have traditionally been resolved by schedlers that have perfect information abot the past exection Hoever sch schedlers are too poerfl for certain settings sch as cryptographic protocol analysis here information mst sometimes be hidden Here e propose a ne less poerfl nondeterminismresoltion mechanism for PIAs consisting of tasks and local schedlers Tasks are eqivalence classes of system actions that are schedled by oblivios global task seqences Local schedlers resolve nondeterminism ithin system components based on local information only The reslting task-pia frameork yields simple notions of external behavior and implementation and spports simple compositionality reslts e also define a ne kind of simlation relation and sho it to be sond for proving implementation e illstrate the potential of the task-pia frameork by otlining its se in verifying an blivios Transfer protocol I INTRDUCTIN The Probabilistic I/ Atomata (PIA) modeling frameork [Seg95] [SL95] is a simple combination of I/ Atomata [LT89] and Markov Decision Processes (MDP) [Pt94] As demonstrated in [LSS94] [SV99] [PSL00] PIAs are ell sited for modeling and analyzing distribted algorithms that se randomness as a comptational primitive In this setting distribted processes se random choices to break symmetry in solving problems sch as choice coordination [R82] and consenss [B83] [AH90] Each process is modeled as an atomaton ith random transitions and an entire protocol is modeled as the parallel composition of process atomata and atomata representing commnication channels This modeling paradigm combines nondeterministic and probabilistic choices in a natral ay Nondeterminism is sed here for modeling ncertainties in the timing of events in highly npredictable distribted environments It is also sed for modeling distribted algorithms at high levels of abstraction leaving many details nspecified This in trn facilitates algorithm verification becase reslts proved Canetti is spported by NSF CyberTrst Grant ; Cheng by DFG/N bilateral cooperation project Validation of Stochastic Systems (VSS); Kaynar and Lynch by DARPA/AFSR MURI Aard F MURI AFSR Aard SA2796P NSF Aards CCR and CCR and USAF AFRL Aard FA ; Pereira by the Belgian National Fnd for Scientific Research (FNRS); and Segala by MURST project Constraintbased Verification of reactive systems (CoVer) abot nondeterministic algorithms apply atomatically to an entire family of algorithms obtained by resolving the nondeterministic choices in particlar ays In order to formlate and prove probabilistic properties of distribted algorithms one needs mechanisms for resolving the nondeterministic choices In the randomized distribted setting the most common mechanism is a perfectinformation event schedler hich has access to local state and history of all system components and has nlimited comptation poer Ths probabilistic properties of distribted algorithms are typically asserted ith respect to orst-case adversarial schedlers ho can choose the next event based on complete knoledge of the past (eg [PSL00]) ne old expect that a similar modeling paradigm inclding both probabilistic and nondeterministic choices old be similarly sefl for modeling cryptographic protocols These are special kinds of distribted algorithms designed to protect sensitive data hen it is transmitted over nreliable channels Their correctness typically relies on comptational assmptions hich say that certain problems cannot be solved by an adversarial entity ith bonded comptation resorces [Gol01] Hoever a major problem ith this extension is that the perfect-information schedler mechanism sed for distribted algorithms is too poerfl for se in the cryptographic setting A schedler that cold see all information abot the past old in particlar see secret information hidden in the states of non-corrpted protocol participants and be able to divlge this information to corrpted participants eg by encoding it in the order in hich it schedles events In this paper e present task-pias an adaptation of PIAs that has ne less poerfl mechanisms for resolving nondeterminism Task-PIAs are sitable for modeling and analyzing cryptographic protocols; they may also be sefl for other kinds of distribted systems in hich the perfect information assmption is nrealistically strong Task-PIAs: A task-pia is simply a PIA agmented ith a partition of non-inpt actions into eqivalence classes called tasks A task is typically a set of related actions for example all the actions of a cryptographic protocol that send a rond 1 message Tasks are nits of schedling; they are schedled by simple oblivios global task schedle seqences e define notions of external behavior and implementation for task-pias based on the trace distribtion semantics proposed by Segala [Seg95] e define parallel composition in the obvios ay and sho that or implementation relation is compositional

2 e also define a ne type of simlation relation hich incorporates tasks and prove that it is sond for proving implementation relationships beteen task-pias This ne relation differs from simlation relations stdied earlier [SL95] [LSV03] in that it relates probability measres rather than states In many cases inclding or ork on cryptographic protocols (see belo) tasks alone sffice for resolving nondeterminism Hoever for extra expressive poer e define a second mechanism local schedlers hich can be sed to resolve nondeterminism ithin system components based on local information only This mechanism is based on earlier ork in [CLSV04] Cryptographic protocols: In [CC 06a] e applied the task-pia frameork to analyze an blivios Transfer (T) protocol of Goldreich et al [GM87] That analysis reqired defining extra strctre for task-pias in order to express isses involving comptational limitations Ths e defined notions sch as time-bonded task-pias and approximate implementation ith respect to time-bonded environments Details are beyond the scope of this paper bt e otline or approach in Section IV Adversarial schedling: The standard schedling mechanism in the cryptographic commnity is an adversarial schedler namely a resorce-bonded algorithmic entity that determines the next move adaptively based on its on vie of the comptation so far This is eaker than the perfect-information schedler sed for distribted algorithms hich have access to local state and history of all components and have nlimited comptation poer r task schedle seqences are essentially oblivios schedlers hich fix the entire schedle of tasks nondeterministically in advance This formlation does not directly captre the adaptivity of adversarial schedlers r soltion is to separate schedling concerns into to parts e model the adaptive adversarial schedler as a system component for example a message delivery service that can eavesdrop on the commnications and control the order of message delivery Sch a system component has access to partial information abot the exection: it sees information that other components commnicate to it dring exection bt not secret information that these components hide n the other hand basic schedling choices are resolved by a task schedle seqence chosen nondeterministically in advance These tasks are eqivalence classes of actions independent of actal choices that are determined dring the exection e believe this separation is conceptally meaningfl: The high-level adversarial schedler is responsible for choices that are essential in secrity analysis sch as the ordering of message deliveries The lo-level schedle of tasks resolves inessential choices For example in the T protocol both the transmitter and receiver make random choices bt it is inconseqential hich does so first Related ork: The literatre contains nmeros models that combine nondeterministic and probabilistic choices (see [SdV04] for a srvey) Hoever fe tackle the isse of partial-information schedling as e do Exceptions inclde [CH05] hich models local-oblivios schedling and [da99] hich ses partitions on the state space to obtain partial-information schedles The latter is essentially ithin the frameork of partially observable MDPs (PMDPs) originally stdied in the context of reinforcement learning [KLA98] All of these acconts neglect partial information aspects of (parameterized) actions therefore are not sitable in a cryptographic setting A version of local schedlers as introdced in [CLSV04] r general approach to cryptographic protocol verification as directly inspired by the Interactive Tring Machine (ITM) frameork of [Can01] There participants in a protocol are modeled as ITMs and messages as bit strings ritten on inpt and otpt tapes ITMs are prely probabilistic and schedling nondeterminism is resolved sing predefined rles In principle this frameork cold be sed to analyze cryptographic protocols rigorosly inclding comptational complexity isses Hoever complete analysis of protocols in terms of Tring machines is impractical becase it involves too many lo-level machine details Indeed in the comptational cryptography commnity protocols are typically described sing an informal high-level langage and proof sketches are given in terms of the informal protocol descriptions e aim to provide a frameork in hich proofs in the ITM style can be carried ot formally at a high level of abstraction Also e aim to exploit the benefits of nondeterminism to a greater extent than the ITM approach Several other researchers have added featres for comptational cryptographic analysis to conventional abstract concrrency modeling frameorks sch as process algebras and restricted forms of PIAs [LMMS98] [P00] [P01] [MMS03] These approaches again se less nondeterminism than e do: individal system components are prely probabilistic and schedling is determined by predefined rles For example in [LMMS98] a niform distribtion is imposed on the set of possible redctions for each term In [MMS03] internal redctions are prioritized over external commnications and several independence properties are assmed In [P01] schedling is based on a distribted scheme herein each system component schedles the next one based on its on local information None of the prior ork separates high-level and lo-level nondeterminism resoltion as e do Roadmap: Section II defines task-pias task schedles composition and implementation and presents a compositionality reslt Section III presents or simlation relation and its sondness theorem Section IV smmarizes or T protocol case stdy Section V discsses local schedlers and conclding discssions follo in Section VI Frther details appear in [CC 06b] II TASK-PIAS A Basic PIAs e assme or reader is comfortable ith basic notions of probability theory sch as -fields and (discrete) probability measres A smmary is provided in [CC 06b] A probabilistic I/ atomaton (PIA) is a tple here: (i) is a contable set of states ith start state ; (ii) and are contable and pairise disjoint sets of actions referred to as inpt otpt and internal actions respectively; and (iii)

3 Z Z ; U is a transition relation here is the set of discrete probability measres on An action is enabled in a state if for some The set is called the action alphabet of If then is closed The set of external actions of is and the set of locally controlled actions is e assme that satisfies: Inpt enabling: For every state and inpt action is enabled in Transition determinism: For every and there is at most one sch that If there is exactly one sch it is denoted '( by and e rite "$&% for the transition An exection fragment of is a finite or infinite seqence ) +* - &/01020 of alternating states and actions sch that (i) if ) is finite then it ends ith a state; and (ii) for every non-final 3 there is a transition 24 4 ith 24 +5&6& &6 7 here denotes the spport of e rite :<; ) for * and if ) is finite e rite :<; ) A for its last state e se >/"$@? (resp >/"$@? ) to denote the set of all (resp all finite) exection fragments of An exection of is an exection fragment beginning from the start state 1 ++A B8CD; (resp B8CD; ) denotes the set of all (resp finite) exections of The trace of an exection fragment ) ritten "E ) is the restriction of ) to the set of external actions of The symbol F denotes the prefix relation on seqences hich applies in particlar to exection fragments and traces Nondeterministic choices in are(a resolved IHKJMLN5&/ sing a schedler hich is a fnction G>/"E@? P sch that +5&6&6 ) implies ) LN5&R Q :<; Here denotes the set of discrete sb-probability measres on that is the measre of the entire space is reqired to be FTS Ths decides (probabilistically) hich transition (if any) to take after each finite exection fragment ) A schedler and a finite exection fragment ) generate a measre UV on the -field XY generated 8[ by cones of exection fragments here each cone Z is the set of exection fragments [ that have ) \ as a prefix The measre of a cone U(V is defined recrsively as: 1) ] if )'\_^ F ) and )`^ F )\ 2) S if )'\ F ) [ [ < 3) U V b[ [dc V&a if )\ is of the form )\ \ and ) F )\ \ b[ [ec Here V&a )\ \ "E&%Dfgdhdijhdk a [ [ cl l f gdhdijhek a [ [ cm )\ \ is defined to be that is the probability that chooses a transition labeled by and that the ne state is Standard measre theoretic argments 9 ensre that U V is ell-defined e call the state :<; ) the first state of U V 9 and denote it by :<; U V If ) consists of the start state only e call U V a probabilistic exection of +A Let be a discrete n probability measre over >/"E@? e denote by U V the measre o ) n U V and e say that U V is generated by n and e call the measre U V a generalized probabilistic exection fragment of If every exection fragment n +5&686 p in consists of a single state then e call U V a probabilistic exection fragment of e note that the "$ ; fnction is a measrable fnction from X Y to the -field generated by cones of traces Ths given a probability measre U on X Y e define the trace distribtion of U denoted q to be the image measre of U nder "E ; e denote by q the set of trace distribtions of (probabilistic exections of) Definition 21: To PIAs sr PtR S are said to be compatible if 41v x 41v henever 3 y ^ In that case e define their composition {z to be the PIA / here is the set of triples } sch that (i) is enabled in some :4 and (ii) for every 3 if 4 then otherise 4 ~ 24 This definition can be extended to any finite nmber of PIAs rather than jst to B Task-PIAs e no agment the PIA frameork ith task partitions or main mechanism for resolving nondeterminism P Definition 22: A task-pia is a pair G here (i) is a PIA (satisfying transition determinism) and (ii) is an eqivalence relation on the locally-controlled actions ( ) The eqivalence classes of are called tasks A task is enabled in a state if some is enabled in Unless otherise stated technical notions for task-pias are inherited from those for PIAs Exceptions inclde the notions of probabilistic exections and trace distribtions For no e impose the folloing action-determinism assmption hich implies that tasks alone are enogh to resolve all nondeterministic choices e ill remove this assmption hen e introdce local schedlers in Section V Action determinism: For every state and task at most one action is enabled in A task schedle for is any finite or infinite seqence M of tasks in A task schedle is static (or oblivios) in the sense that it does not depend on dynamic information generated dring exection Under the action-determinism assmption a task schedle can be sed to generate a niqe probabilistic exection and hence a niqe trace distribtion of the nderlying PIA ne can do this by repeatedly schedling tasks each of hich determines at most one transition of Formally e define an operation that applies a task schedle to a task-pia: Definition 23: Let be an action-deterministic task-pia here Given >/"E@? A and a task schedle 6&6 p is the probability measre on >/"E@? defined recrsively by: 6&6 7 P 1) ( denotes the empty seqence) 2) For 6&6 p is defined as follos For every ) (A 6&6 7 >/"$@? ) ˆŠ Œ here: )'\ < if ) is of the form )\ here and :<; ) \ ; Ž] otherise ) if is not enabled in :<; ) ; N ] otherise 3) For of the form R\ 686 p 686 6&6 p \ 4) For 686 p infinite e d 4d 6&6 p &4 here /4 denotes the length-3 prefix of In Case (2) above represents the probability that ) is exected hen applying task at the end of ) \ Becase of

4 ~ :<; is niqe and so is ell-defined The term represents the original probability ) transition-determinism and action-determinism the transition )'\ hich is relevant if is not enabled after ) It is rotine to check that the limit in Case (4) is ell-defined The other to cases are straightforard 6&6 7 Next e sho that is a generalized probabilistic exection fragment generated by and a schedler for in the sal sense Ths a task schedle for a task-pia is a special case of a schedler P for the nderlying PIA Theorem 24: Let G be an action-deterministic A task-pia For each measre and task on >/"$@? schedle there is schedler for 6&6 7 sch that n is the generalized 6&6 probabilistic 7 exection fragment U V Any sch is said to be a generalized probabilistic exection fragment of Probabilistic exection fragments and probabilistic exections are then defined by making the same restrictions as for basic PIAs e rite p q as shorthand for q the trace distribtion obtained by applying task schedle starting from the measre on exection fragments e rite q 6&6 for q the trace distribtion obtained by applying from the niqe start state (Recall that the Dirac measre for an element ~ is the discrete probability measre that assigns probability S to r ) A trace distribtion of is any q e se q to denote the set r q is a task schedle for Finally e define composition of task-pias: Definition 25: To task-pias 4 4 P 4 3 r PtR S are said to be compatible provided the nderlying PIAs are 686 p compatible In this case e define their composition {z to be the task-pia P I z It is easy to see that 8z is in fact a task-pia In particlar since compatibility ensres disjoint sets of locallycontrolled actions Š is an eqivalence relation on the locally-controlled actions of bz It is also easy to see that action determinism is preserved nder composition Note that hen to task-pias are composed no ne mechanisms are reqired to schedle actions of the to components the tasks alone are enogh C Implementation e no define the notion of external behavior for a task- PIA and the indced implementation relation beteen task- PIAs Unlike previos definitions of external behavior the one e se here is not simply a set of trace distribtions Rather it is a mapping that specifies for every possible environment for the given task-pia the set of trace distribtions that can arise hen is composed ith Definition 26: Let be any task-pia and be an action-deterministic task-pia e say that is an environment for if (i) is compatible ith and (ii) the composition z is closed Note that may have otpt actions that are not in the signatre of Definition 27: The external behavior of denoted by ;C@ ; is the total fnction that maps each environment to the set of trace distribtions q z Ths for each environment e consider the set of trace distribtions that arise from all task schedles Note that these traces may inclde ne otpt actions of in addition to the external actions already present in r definition of implementation is inflenced by common notions in the secrity literatre (eg [LMMS98] [Can01] [P01]) Namely the implementation mst look like the specification from the perspective of every possible environment The precise notion of implementation is formlated in terms of inclsion of sets of trace distribtions for each environment atomaton An advantage of this style of definition is that it yields simple compositionality reslts (Theorem 29) Definition 28: Let and be comparable actiondeterministic task-pias that is and e say that implements ritten F * if ;C@ ; ;C@ ; for every environment for both and In other ords e reqire q q for every The sbscript ] in the relation symbol F * refers to the reqirement that every trace distribtion in q N mst have an identical match in q For secrity analysis e also define another relation F hich allos negligible discrepancies beteen matching trace distribtions [CC 06a] D Compositionality Becase external behavior and implementation are defined in terms of mappings from environments to sets of trace distribtions a compositionality reslt for F * follos easily: Theorem 29: Let R be comparable actiondeterministic task-pias sch that N F * R and let be an action-deterministic task-pia compatible ith each of and R Then z F * R z P Proof Let be any environment (actiondeterministic) task-pia for both N z and R z Fix any task schedle for z z Let be the trace distribtion of z z generated by It sffices to sho that is also generated by some task schedle for R z z Note that is also a task schedle for {z /z and that generates the same trace distribtion in the composed task-pia bz /z No &z is an (action-deterministic) environment task- PIA for each of and Since by assmption F * e infer the existence of a task schedle for R z z sch that generates trace distribtion in the task-pia R z z Since is also a task schedle for - z z and generates this sffices III SIMULATIN RELATINS e define a ne simlation relation notion for closed action-deterministic task-pias and sho that it is sond for proving F * r definition is based on three operations involving probability measres: flattening lifting and expansion These have been previosly defined eg in [LSV03] A Flattening lifting and expansion The flattening operation takes a discrete probability measre over probability measres and flattens it into a single probability measre Formally let be a discrete probability measre p on Then the flattening of denoted by :l<;{% p is the discrete probability measre on defined by :l<;b% o n g c 7 l a The lifting operation takes a relation beteen to domains and and lifts it to a relation beteen discrete

5 ~ A A A ~ A F measres over and Informally speaking a measre on is related to a measre on if can be obtained by redistribting the probability masses assigned by in 7 is respected Formally the lifting of denoted by is a relation from to defined by: Œ J * iff there exists a eighting fnction sch that 1) For each and ] implies 2) For each o 3) For each o sch a ay that the relation Finally the expansion operation takes a relation beteen discrete measres on to domains and retrns a relation of the same kind that relates to measres henever they can be 7 decomposed into to -related measres Formally let be a relation from to P The expansion of ritten is a relation from to iff there exist to discrete measres respectively sch that e se expansions directly in or definition of simlation means that it is possible to simlate defined by: and on and 7 :l<;{% 7 :l<;{% and Informally from } anything that can happen from Frthermore \ \ means that e can decompose \ and \ into pieces that can simlate each other and so e can say that it is also possible to simlate from \ anything that can happen from \ This intition is at the base of the proof of or sondness reslt (cf Theorem 35) B Simlation relation definition e need to more axiliary definitions The first expresses consistency beteen a probability measre over finite exections and a task schedle: informally a measre U over finite exections is said to be consistent ith a task schedle if it assigns non-zero probability only to those exections that are possible nder the task schedle e se this condition in order to avoid seless proof obligations in or definition of simlation relation Definition 31: Let be a closed actiondeterministic task-pia U a discrete probability measre over finite exections of and a finite task schedle for Then U is consistent ith 1586&6 provided that +5&6&6 686 U here is the start state of For the second definition sppose e have a mapping that given a finite task schedle and a task of a task- PIA yields a task schedle of another task-pia The idea is that describes ho matches task given that it has already matched the task schedle Using that given a task schedle 9 5 e define a ne fnction ˆ iterates on all the elements of ths prodcing a fll task schedle of - that matches all of Definition 32: Let P 7 and R be to task-pias and let A J be a fnction that assigns a finite task schedle of to each finite task schedle of and task of 9 5 A J 9 5 Define j ˆ 9 5 recrsively as follos: ˆ ˆ and ˆ 9 5 ˆ 9 5 (the concatenation of ˆ and ) e can no define or ne notion of simlation for task- PIAs and establish its sondness ith respect to the F * relation Note that or simlation relations do not jst relate states to states bt rather probability measres on exections to probability measres on exections 1 The se of measres on exections here rather than jst exections is motivated by certain cases that arise in or T protocol proof eg cases here related random choices are made at different points in the lo-level and high-level models (see Section III-D) Definition 33: Let and P be to comparable closed action-deterministic task-pias Let be a relation from + B8C@; A to + B8CD; A sch that if U1 U( then q U+ q U( Then is a simlation from to R 7 if there exists A _J sch that the folloing properties hold: 1) Start condition: ~ 2) Step condition: If U1 U( ith U( 9 5 is consistent ith ˆ and then U \ U \ 6&6 here U \ U and U \ 686 U( C Sondness U+ is consistent Lemma 34: Let and be comparable closed actiondeterministic task-pias a simlation from to Let U and U be discrete probability measres over finite exections of and respectively sch that U U Then q U q U The folloing theorem says that for closed task-pias the existence of a simlation relation implies inclsion of sets of trace distribtions r main sondness reslt for (not necessarily closed) task-pias then follos as a corollary Theorem 35: Let and - be comparable closed actiondeterministic task-pias If there exists a simlation relation from to R then q q R Proof Let be the assmed simlation relation from K to Let U be the probabilistic exection of generated by and a (finite or infinite) task schedle For each 3 ] define /4 to be 4 4 Let U be the probabilistic exection generated by and e claim that q U q U hich sffices For each y ] let U 686 M and U 6&6 T Then for each y] U U and U F U ; moreover e d x U U and d e x U 6&6 U Also for every y ] U+ U+ 6&6 and U( U( bserve that U1 * `~ and U( * ~ The start condition for a simlation relation and a trivial expansion imply that U+ * 7 U( * Then by indction sing the definition of a simlation relation in proving the indctive step (this ses a series of lemmas; see [CC 06b] for details) e sho that for each y ] U 7 U Then by Lemma 34 for each y ] q U q U No q U d e q U and q U d d x q U Since for each y ] q U q U e conclde that q U q U as needed Corollary 36: Let and be to comparable actiondeterministic task-pias Sppose that for every environment for both and there exists a simlation relation from z to R z Then F * R 1 It old be nice to simplify this definition so that it involves measres on states instead of measres on exections bt e don t yet kno ho to do this

6 Z D Example: D: vs The folloing example from or T proof as a key motivation for generalizing prior notions of simlation relations e consider to closed task-pias D: and chooses a nmber randomly and otpts it D: on the other hand first chooses a random nmber then applies a knon permtation to the chosen nmber and then otpts the reslt (The name D: refers to the type of permtation that is sed in the T protocol) More precisely has otpt actions P x r S and internal action It has tasks P r P and Z r Its state contains one variable / hich assmes vales in r initially The action is enabled hen & and has the effect of setting / to a nmber in chosen niformly at random The action is enabled hen /Œ and has no effect on the state (so it may happen repeatedly) See Figre 1 choose z 1 z 2 z n report(1) report(2) report(n) Fig 1 Task-PIA "$ D2 has the same actions as pls internal action % '&() It has the same tasks as pls the task Z % '&()Ž r % '&() D: s state contains to variables and each of hich takes on vales in r initially The action is enabled hen I and sets to a nmber in chosen niformly at random The % *&*) action is enabled hen ^ and and sets s+ The P action behaves exactly as in See Figre 2 choose y 1 y 2 y n compte compte compte Fig 2 z f (1) report(f (1)) report(f (2)) z f (2) report(f (n)) z f (n) Task-PIA -/10$2323- e anted to se a simlation relation to prove that q D2 7 q % In doing so e decided that the steps that define shold correspond in the to atomata hich meant that the steps of D: hich define shold map to no steps of Then beteen the and % *&*) in D: a randomly-chosen vale old appear in the component of D: s state bt no sch vale old appear in the corresponding state of Therefore the simlation relation old have to relate a probability measre on states of to a single state of e ere able to express this correspondence sing a simlation relation of or ne kind: If U and U are discrete measres over finite exection fragments of D: and respectively then e defined U U exactly +5&6&6 if the folloing conditions hold: (i) For every :<; U and & 1586&6 :<; U 0 5&0 (ii) For every & 1586&6 :<; U if &0 then either :<; U 0 is everyhere ndefined or else it is the niform distribtion on The task correspondence mapping is defined by: Z % '&() Z P P P IV APPLICATIN T SECURITY PRTCLS In [CC 06a] e se the task-pias of this paper to model and analyze the blivios Transfer (T) protocol of Goldreich et al [GM87] In the T problem to inpt bits * are sbmitted to a Transmitter and a single inpt bit 3 to a Receiver After engaging in an T protocol shold otpt only the single bit 4 shold not learn the other bit N4 and D shold not learn 3 ; moreover an eavesdropping adversary shold not by observing the protocol messages be able to learn anything abot the inpts or the progress of the protocol T has been shon to be complete for mltiparty secre comptation in the sense that sing T as the only cryptographic primitive one can constrct protocols for secrely realizing any fnctionality The protocol of [GM87] ses trap-door permtations (and hard-core predicates) as an nderlying cryptographic primitive It ses three ronds of commnication: First chooses a random trap-door permtation and sends D it to Second chooses to random nmbers * & and sends * to D here 4 for the inpt index 3 is 4 and K4 K4 Third D applies the same transformation 6 to each of * and and sends the reslts back as * 76 Finally decodes and otpts the correct bit The protocol ses cryptographic primitives and comptational hardness in an essential ay Its secrity is inherently only comptational so its analysis reqires modeling comptational assmptions r analysis follos the trsted party paradigm of [GM87] ith a formalization that is close in spirit to [P00] [Can01] e first define task-pias representing the real system (RS) (the 8 protocol) and the ideal system (IS) (the reqirements) In typical tasks inclde choose random * / send rond 1 message and deliver rond 1 message as ell as arbitrary tasks of incompletelyspecified environment and adversary atomata Note that these tasks do not specify exactly hat transition occrs; eg the send task does not specify the message contents these are chosen by D based on its on internal state Then e prove that 8 implements 8 The proof consists of for cases depending on hich parties are corrpted 2 In the to cases here D is corrpted e can sho that 8 8 implements nconditionally sing F * In the cases here D is not corrpted e can sho implementation only in a comptational sense namely (i) for resorcebonded adversaries (ii) p to negligible differences and 2 Actally in [CC9 06a] e prove only one case hen only is corrpted e prove all for cases in [CC9 05] bt sing a less general definition of task-pias than the one sed here and in [CC9 06a] and ith non-branching adversaries

7 8 8 8 (iii) nder comptational hardness assmptions Modeling these aspects reqires additions to the task-pia frameork of this paper namely defining a time-bonded version of task-pias and defining a variation F on the F * relation hich describes approximate implementation ith respect to polynomial-time-bonded environments Similar relations ere defined in [LMMS98] [P01] r simlation relations are also sond ith respect to F e also provide models for the cryptographic primitives (trap-door fnctions and hard-core predicates) Part of the specification for sch primitives is that their behavior shold look approximately random to otside observers; e formalize this in terms of F The correctness proofs proceed by levels of abstraction relating each pair of models at sccessive levels sing F In the case here only is corrpted all bt one of the relationships beteen levels are proved sing simlation relations as defined in this paper (and so they garantee F * ) The only exception relates a level in hich the cryptographic primitive is sed ith a higher level in hich the se of the primitive is replaced by a random choice Shoing this correspondence relies on or F -based definitions of the cryptographic primitive and on composition reslts for timebonded task-pias Since this type of reasoning is isolated to one correspondence the methods of this paper in fact sffice to accomplish most of the ork of verifying T Each of or system models at each level incldes an explicit adversary component atomaton hich acts as a message delivery service that can eavesdrop on commnications and control the order of message delivery The behavior of this adversary is arbitrary sbject to general constraints on its capabilities In or models the adversary is the same at all levels so or simlation relations relate the adversary states at consective levels directly sing the identity fnction This treatment allos s to consider arbitrary adversaries ithot examining their strctre in detail (they can do anything bt mst do the same thing at all levels) Certain patterns that arise in or simlation relation proofs led s to extend earlier definitions of simlation relations [SL95] [LSV03] by adding the expansion capability and by corresponding measres to measres: (i) e often correspond random choices at to levels of abstraction for instance hen the adversary makes a random choice from the same state at both levels e old like or simlation relation to relate the individal otcomes of the choices at the to levels matching p the states in hich the same reslt is obtained Modeling this correspondence ses the expansion featre (ii) The D: vs example described in Section III occrs in or T proof Here the lo-level system chooses a random and then comptes sing a trap-door permtation The higher level x system simply chooses the vale of randomly ithot sing vale or permtation This correspondence relates measres to measres and ses expansion (iii) In another case a loer-level system chooses a random vale and then comptes a ne vale by XR ing ith an inpt vale The higher level system jst chooses a random vale Hoever XR ing any vale ith a random vale yields the same reslt as jst choosing a random vale This correspondence relates measres to measres and ses expansion V LCAL SCHEDULERS ith the action-determinism assmption or task mechanism is enogh to resolve all nondeterminism Hoever action determinism limits expressive poer No e remove this assmption and add a second mechanism for resolving the reslting additional nondeterminism namely a local schedler for each component task-pia A local schedler for a given component can be sed to resolve nondeterministic choices among actions in the same task sing only information abot the past history of that component Here e define one type of local schedler hich ses only the crrent state and indicate ho or reslts for the actiondeterministic case carry over to this setting r notion of local schedler is simply a sb-atomaton : e say that task-pia \ \ P \ is a sb-task-pia of task-pia provided that all components are identical except that \ here and \ are the sets of discrete transitions of and \ respectively Ths the only difference is that \ may have a smaller set of transitions A local schedler for a task-pia is any action-deterministic sb-task-pia of A probabilistic system is a pair here is a task-pia and is a set of local schedlers for A probabilistic exection of a probabilistic system is defined to be any probabilistic 8 exection of any task-pia If and are to probabilistic systems and and are compatible then their composition {z is the probabilistic system 8z here is the set of local schedlers for {z of the form bz 8 for some 8 and If is a probabilistic system then an environment for is any environment (action-deterministic task- PIA) for If is a probabilistic system then the external behavior of ;C@ ; is the total fnction that maps each environment task-pia for to the set 8 q z Ths for each environment e consider the set of trace distribtions that arise from to choices: of a local schedler of and of a global task schedle If and are comparable probabilistic systems (ie and are comparable) then implements ritten F * provided that ;C@ ; ;+C: ; for every environment (action-deterministic) task-pia for both and e obtain a sfficient condition for implementation of probabilistic systems in hich each local schedler for the lolevel system alays corresponds to the same local schedler of the high-level system Theorem 51: Let and be to comparable probabilistic systems Sppose that is a total fnction from to 8 sch that for every F * 8 Then F * e also obtain a compositionality reslt for probabilistic systems The proof is similar to that of Theorem 29 for the action-deterministic case Theorem 52: Let be comparable probabilistic systems sch that F * and let be a probabilistic system compatible ith each of and Then {z F * 8z

8 VI CNCLUSINS e have extended the traditional PIA model ith a task mechanism hich provides a systematic ay of resolving nondeterministic schedling choices ithot sing information abot past history e have provided basic machinery for sing the reslting task-pia frameork for verification inclding a compositional trace-based semantics and a ne kind of simlation relation e have proposed extending the frameork to allo additional nondeterminism resolved by schedlers that se only local information e have illstrated the tility of these tools ith a case stdy involving analysis of an blivios Transfer cryptographic protocol Althogh or development as motivated by concerns of cryptographic protocol analysis partial-information schedling is interesting in other settings For example some distribted algorithms ork ith partial-information adversarial schedlers althrogh the problems they solve are provably nsolvable ith perfect-information adversaries [Cha96] [Asp03] Also partial-information schedling is realistic for modeling large distribted systems in hich basic schedling decisions are made locally and not by any centralized mechanism Many qestions remain in or stdy of task-pias: r notion of implementation F * is defined by considering all environments; can e characterize F * sing a small sbclass of environments? Can or simlation relation notion be simplified ithot sacrificing sondness or applicability? Also or notion of local schedlers needs frther development It remains to consider more applications of task-pias for cryptographic protocol analysis and for other applications A next step in cryptographic protocol analysis is to formlate and prove protocol composition reslts like those of [P00] [Can01] in terms of task-pias Finally e old like to model perfect-information schedlers as sed for analyzing randomized distribted algorithms sing task-pias Acknoledgments: e thank Frits Vaandrager for collaboration in early stages of this project and Michael Backes Anpam Datta Ralf Kesters John Mitchell Birgit Pfitzmann and Andre Scedrov for technical discssions that helped s in clarifying or ideas and their connections to other ork in analysis of cryptographic protocols e thank Silvio Micali for impressing pon s the importance of adaptive adversarial schedlers in the cryptographic setting e thank Sayan Mitra both for technical discssions and for help in prodcing the paper REFERENCES [Asp03] J Aspnes Randomized protocols for asynchronos consenss Distribted Compting 16(2-3): [AH90] J Aspnes and M Herlihy Fast randomized consenss sing shared memory Jornal of Algorithms 11(2) pages September 1990 [B83] M Ben-r Another advantage of free choice: Completely asynchronos agreement protocolsproc 2nd ACM Symposim on Principles of Distribted Compting pages 2730 Montreal Qebec Canada Agst 1983 [Can01] R Canetti Universally composable secrity: a ne paradigm for cryptographic protocols Proc42nd IEEE Symposim on Fondations of Compting pages [CC9 05] R Canetti L Cheng D Kaynar M Liskov N Lynch Pereira and R Segala Using probabilistic I/ atomata to analyze an oblivios transfer protocol Technical Report MIT-LCS-TR-1001a MIT CSAIL 2005 [CC9 06a] [CC9 06b] [CLSV04] [CH05] [Cha96] [da99] [GM87] R Canetti L Cheng D Kaynar M Liskov N Lynch Pereira and R Segala Using task-strctred probabilistic I/ atomata to analyze an oblivios transfer protocol Technical Report MIT-CSAIL-TR MIT CSAIL 2006 Available at R Canetti L Cheng D Kaynar M Liskov N Lynch Pereira and R Segala Task-strctred probabilistic I/ atomata Technical Report MIT-CSAIL-TR L Cheng N Lynch R Segala and F Vaandrager Sitched PIA: Parallel Composition via Distribted Schedling To appear in TCS Special Isse on FMC 2004 L Cheng and M Hendriks Casal dependencies in parallel composition of stochastic processes Technical Report ICIS- R05020 Institte for Compting and Information Sciences University of Nijmegen 2005 TD Chandra Polylog randomized ait-free consenss Proc 15th ACM Symposim on Principles of Distribted Compting pages L de Alfaro The verification of probabilistic systems nder memoryless partial-information policies is hard Proc PRB- MIV 99 pages Goldreich S Micali and A igderson Ho to play any mental game Proc 19th Symposim on Theory of Compting (STC) pages ACM 1987 [Gol01] Goldreich Fondations of Cryptography: Basic Tools volme I Cambridge University Press 2001 [KLA98] LP Kaelbling ML Littman and ARCassandra Planning and acting in partially observable stochastic domains Artificial Intelligence 101: [LMMS98] P Lincoln JC Mitchell M Mitchell and A Scedrov A probabilistic poly-time frameork for protocol analysis In ACM Conference on Compter and Commnications Secrity pages [LSS94] NA Lynch I Saias and R Segala Proving time bonds for randomized distribted algorithms Proc 13th ACM Symposim on Principles of Distribted Compting pages [LSV03] NA Lynch R Segala and F Vaandrager Compositionality for probabilistic atomata Proc 14th International Conference on Concrrency Theory (CNCUR 2003) volme 2761 of LNCS pages Springer-Verlag 2003 [LT89] [MMS03] [PSL00] NA Lynch and MR Tttle An introdction to inpt/otpt atomata CI Qarterly 2(3): September 1989 P Mates JC Mitchell and A Scedrov Composition of cryptographic protocols in a probabilistic polynomial-time process calcls Proc CNCUR 2003 pages A Pogosyants R Segala and NA Lynch Verification of the randomized consenss algorithm of Aspnes and Herlihy: a case stdy Distribted Compting 13(3): [Pt94] ML Pterman Markov Decision Process Discrete Stochastic Dynamic Programming John iley & Sons Inc Ne York NY 1994 [P00] B Pfitzman and M aidner Composition and integrity [P01] [R82] [RMST04] preservation of secre reactive systems Proc CCS B Pfitzman and M aidner A model for asynchronos reactive systems and its application to secre message transmission Proc IEEE Symposim on Research in Secrity and Privacy pages M Rabin The choice coordination problem Acta Informatica 17: A Ramanathan JC Mitchell A Scedrov and V Teage Probabilistic bisimlation and eqivalence for secrity analysis of netork protocols Proc FSSACS [SdV04] A Sokolova and EP de Vink Probabilistic atomata: system types parallel composition and comparison In Validation of Stochastic Systems volme 2925 of LNCS pages 1 43 Springer-Verlag 2004 [Seg95] R Segala Modeling and Verification of Randomized Distribted Real-Time Systems PhD thesis Department of Electrical Engineering and Compter Science Massachsetts Institte [SL95] [SV99] of Technology Jne 1995 Available as Technical Report MIT/LCS/TR-676 R Segala and NA Lynch Probabilistic simlations for probabilistic processes Nordic Jornal of Compting 2(2): MIA Stoelinga and F Vaandrager Root contention in IEEE 1394 Proc 5th International AMAST orkshop on Formal Methods for Real-Time and Probabilistic Systems volme 1601 of LNCS pages Springer-Verlag 1999

Regular Specifications of Resource Requirements for Embedded Control Software

Regular Specifications of Resource Requirements for Embedded Control Software Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces

More information

Optimal Trust Network Analysis with Subjective Logic

Optimal Trust Network Analysis with Subjective Logic The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway

More information

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic

More information

On a Generalized Graph Coloring/Batch Scheduling Problem

On a Generalized Graph Coloring/Batch Scheduling Problem Reglar Papers On a Generalized Graph Coloring/Batch Schedling Problem Giorgio Lcarelli 1, Ioannis Milis Dept. of Informatics, Athens University of Economics and Bsiness, 104 34, Athens, Greece, {glc, milis}@aeb.gr

More information

Deploying Network Load Balancing

Deploying Network Load Balancing C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft

More information

11 Success of the Help Desk: Assessing Outcomes

11 Success of the Help Desk: Assessing Outcomes 11 Sccess of the Help Desk: Assessing Otcomes I dread sccess... I like a state of continal becoming, with a goal in front and not behind. George Bernard Shaw Key Findings Respondents help desks tend to

More information

Resource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach

Resource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach Resorce Pricing and Provisioning Strategies in Clod Systems: A Stackelberg Game Approach Valeria Cardellini, Valerio di Valerio and Francesco Lo Presti Talk Otline Backgrond and Motivation Provisioning

More information

Using GPU to Compute Options and Derivatives

Using GPU to Compute Options and Derivatives Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation

More information

Curriculum development

Curriculum development DES MOINES AREA COMMUNITY COLLEGE Crriclm development Competency-Based Edcation www.dmacc.ed Why does DMACC se competency-based edcation? DMACC tilizes competency-based edcation for a nmber of reasons.

More information

Introduction to HBase Schema Design

Introduction to HBase Schema Design Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior

More information

9 Setting a Course: Goals for the Help Desk

9 Setting a Course: Goals for the Help Desk IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities

More information

Linear Programming. Non-Lecture J: Linear Programming

Linear Programming. Non-Lecture J: Linear Programming The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Socrates Th extremes of

More information

Planning a Managed Environment

Planning a Managed Environment C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the

More information

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,

More information

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas Joint Roting and Schedling in Mlti-hop Wireless Netorks ith Directional Antennas Partha Dtta IBM Research India parthdt@in.ibm.com Viek Mhatre Motorola Inc. iekmhatre@motorola.com Debmalya Panigrahi CSAIL,

More information

An unbiased crawling strategy for directed social networks

An unbiased crawling strategy for directed social networks Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of

More information

Pgrading To Windows XP 4.0 Domain Controllers and Services

Pgrading To Windows XP 4.0 Domain Controllers and Services C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables

More information

Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data

Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data Volme: 3 Isse: 8 59-594 Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data Dr. M. Naga Ratna Dept. of Compter Science JNTUH College of Engineering Email: mratnajnt@jnth.ac.in

More information

Every manufacturer is confronted with the problem

Every manufacturer is confronted with the problem HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,

More information

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction

More information

Optimal Personalized Filtering Against Spear-Phishing Attacks

Optimal Personalized Filtering Against Spear-Phishing Attacks Optimal Personalized Filtering Against Spear-Phishing Attacks Aron Laszka and Yevgeniy Vorobeychik and Xenofon Kotsokos Institte for Software Integrated Systems Department of Electrical Engineering and

More information

8 Service Level Agreements

8 Service Level Agreements 8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent

More information

Designing and Deploying File Servers

Designing and Deploying File Servers C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.

More information

GUIDELINE. Guideline for the Selection of Engineering Services

GUIDELINE. Guideline for the Selection of Engineering Services GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by

More information

10 Evaluating the Help Desk

10 Evaluating the Help Desk 10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem

More information

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03 EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information

More information

CRM Customer Relationship Management. Customer Relationship Management

CRM Customer Relationship Management. Customer Relationship Management CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2

More information

Leveraging History for Faster Sampling of Online Social Networks

Leveraging History for Faster Sampling of Online Social Networks Leeraging History for Faster Sampling of Online Social Netorks Zhojie Zho George Washington Uniersity rexzho@g.ed Nan Zhang George Washington Uniersity nzhang10@g.ed Gatam Das Uniersity of Texas at Arlington

More information

Roth 401(k) and Roth 403(b) Accounts: Pay Me Now or Pay Me Later Why a Roth Election Should Be Part of Your Plan Now

Roth 401(k) and Roth 403(b) Accounts: Pay Me Now or Pay Me Later Why a Roth Election Should Be Part of Your Plan Now Reprinted with permission from the Society of FSP. Reprodction prohibited withot pblisher's written permission. Roth 401(k) and Roth 403(b) Acconts: Why a Roth Election Shold Be Part of Yor Plan Now by

More information

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc. FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional

More information

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 A Spare Part Inventory Management Model for Better Maintenance of Intelligent

More information

7 Help Desk Tools. Key Findings. The Automated Help Desk

7 Help Desk Tools. Key Findings. The Automated Help Desk 7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part

More information

Planning an Active Directory Deployment Project

Planning an Active Directory Deployment Project C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,

More information

Kentucky Deferred Compensation (KDC) Program Summary

Kentucky Deferred Compensation (KDC) Program Summary Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth

More information

Compensation Approaches for Far-field Speaker Identification

Compensation Approaches for Far-field Speaker Identification Compensation Approaches for Far-field Speaer Identification Qin Jin, Kshitiz Kmar, Tanja Schltz, and Richard Stern Carnegie Mellon University, USA {qjin,shitiz,tanja,rms}@cs.cm.ed Abstract While speaer

More information

Market Impact and Optimal Equity Trade Scheduling

Market Impact and Optimal Equity Trade Scheduling Market Impact and Optimal Eqity Trade Schedling Dan dibartolomeo Northfield Information Services, Inc. Colmbia University Math Finance Seminar September 2007 Presentation Otline Brief review of the optimal

More information

LIMITS IN CATEGORY THEORY

LIMITS IN CATEGORY THEORY LIMITS IN CATEGORY THEORY SCOTT MESSICK Abstract. I will start assming no knowledge o category theory and introdce all concepts necessary to embark on a discssion o limits. I will conclde with two big

More information

SIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS

SIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS SIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS Jeng-Han Doh 1, Nhat Minh Ho 1, Griffith School of Engineering, Griffith University-Gold Coast Camps, Qeensland, Astralia ABSTRACT

More information

Faster Inversion and Other Black Box Matrix Computations Using Efficient Block Projections

Faster Inversion and Other Black Box Matrix Computations Using Efficient Block Projections Faster Inversion and Other Black Box Matrix Comptations Using Efficient Block Projections Wayne Eberly 1, Mark Giesbrecht, Pascal Giorgi,, Arne Storjohann, Gilles Villard (1) Department of Compter Science,

More information

Designing an Authentication Strategy

Designing an Authentication Strategy C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,

More information

Sickness Absence in the UK: 1984-2002

Sickness Absence in the UK: 1984-2002 Sickness Absence in the UK: 1984-2002 Tim Barmby (Universy of Drham) Marco Ecolani (Universy of Birmingham) John Treble (Universy of Wales Swansea) Paper prepared for presentation at The Economic Concil

More information

Enabling Advanced Windows Server 2003 Active Directory Features

Enabling Advanced Windows Server 2003 Active Directory Features C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment

More information

Planning a Smart Card Deployment

Planning a Smart Card Deployment C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive

More information

A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2

A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2 International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) A Novel QR Code and mobile phone based Athentication protocol via Bletooth Sha Li *1, Shha Zh 2 *1

More information

I Symbolization J,1 II e L~ "-"-:"u"'dll... Table I: The kinds of CGs and their classification, (where, t - a local neighbourhood topology)

I Symbolization J,1 II e L~ --:u'dll... Table I: The kinds of CGs and their classification, (where, t - a local neighbourhood topology) POSTER SESSIONS 484 REPRESENTATION OF THE GENERALIZED DATA STRUCTURES FOR MULTI-SCALE GIS M.O.Govorov Dept. of Cartography,' Siberian State Academy of Geodesy Plahotnogo 10, Novosibirsk, 630108, Rssia

More information

Covering planar graphs with degree bounded forests

Covering planar graphs with degree bounded forests Coering planar graphs ith degree bonded forests D. Gonçales LaBRI, U.M.R. 5800, Uniersité Bordea 1, 351 cors de la Libération 33405 alence Cede, France. Abstract We proe that eer planar graphs has an edge

More information

Chapter 14. Three-by-Three Matrices and Determinants. A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23

Chapter 14. Three-by-Three Matrices and Determinants. A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23 1 Chapter 14. Three-by-Three Matrices and Determinants A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23 = [a ij ] a 31 a 32 a 33 The nmber a ij is the entry in ro i and colmn j of A. Note that

More information

Inter-Dealer Trading in Financial Markets*

Inter-Dealer Trading in Financial Markets* S. Viswanathan Dke University James J. D. Wang Hong Kong University of Science and Technology Inter-Dealer Trading in Financial Markets* I. Introdction Trading between dealers who act as market makers

More information

Closer Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations

Closer Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012

More information

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated

More information

2.1 Unconstrained Graph Partitioning. 1.2 Contributions. 1.3 Related Work. 1.4 Paper Organization 2. GRAPH-THEORETIC APPROACH

2.1 Unconstrained Graph Partitioning. 1.2 Contributions. 1.3 Related Work. 1.4 Paper Organization 2. GRAPH-THEORETIC APPROACH Mining Newsgrops Using Networks Arising From Social Behavior Rakesh Agrawal Sridhar Rajagopalan Ramakrishnan Srikant Yirong X IBM Almaden Research Center 6 Harry Road, San Jose, CA 95120 ABSTRACT Recent

More information

Continuity Analysis of Programs

Continuity Analysis of Programs Continity Analysis of Programs Swarat Chadhri Pennsylvania State University swarat@cse.ps.ed Smit Glwani Microsoft Research smitg@microsoft.com Roberto Lblinerman Pennsylvania State University rlble@ps.ed

More information

WHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor

WHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor WHITE PAPER Filter andwidth Definition of the WaveShaper S-series 1 Introdction The WaveShaper family of s allow creation of ser-cstomized filter profiles over the C- or L- band, providing a flexible tool

More information

Bonds with Embedded Options and Options on Bonds

Bonds with Embedded Options and Options on Bonds FIXED-INCOME SECURITIES Chapter 14 Bonds with Embedded Options and Options on Bonds Callable and Ptable Bonds Instittional Aspects Valation Convertible Bonds Instittional Aspects Valation Options on Bonds

More information

The Intelligent Choice for Basic Disability Income Protection

The Intelligent Choice for Basic Disability Income Protection The Intelligent Choice for Basic Disability Income Protection provider Pls Limited Keeping Income strong We prposeflly engineer or basic disability income prodct to provide benefit-rich featres delivering

More information

Trading and Liquidity with Limited Cognition

Trading and Liquidity with Limited Cognition Trading and Liqidity with Limited Cognition Brno Biais, Johan Hombert, and Pierre-Olivier Weill December 11, 21 Abstract We stdy the reaction of financial markets to aggregate liqidity shocks when traders

More information

TrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings

TrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings TrstSVD: Collaborative Filtering with Both the Explicit and Implicit Inflence of User Trst and of Item Ratings Gibing Go Jie Zhang Neil Yorke-Smith School of Compter Engineering Nanyang Technological University

More information

The Institute Of Commercial Management. Prospectus. Start Your Career Here! www.icm.ac.uk info@icm.ac.uk

The Institute Of Commercial Management. Prospectus. Start Your Career Here! www.icm.ac.uk info@icm.ac.uk The Institte Of Commercial Management Prospects Start Yor Career Here! www.icm.ac.k info@icm.ac.k The fondation of every state is the edcation of it s yoth. Diogenes Laertis Welcome... Althogh we are

More information

High Availability for Microsoft SQL Server Using Double-Take 4.x

High Availability for Microsoft SQL Server Using Double-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network

More information

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.

Position paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists. Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so

More information

Chapter 21. Epidemics. 21.1 Diseases and the Networks that Transmit Them

Chapter 21. Epidemics. 21.1 Diseases and the Networks that Transmit Them From the book Netorks, Crods, and Markets: Reasoning abot a Highly Connected World. By Daid Easley and Jon Kleinberg. Cambridge Uniersity Press, 2010. Complete preprint on-line at http://.cs.cornell.ed/home/kleinber/netorks-book/

More information

Data De-duplication from the data sets using Similarity functions

Data De-duplication from the data sets using Similarity functions Data De-dplication from the data sets sing Similarity fnctions M.Chitrarpa 1, V.Mniraj Naid 2 1 M.Tech Stdent Department of CSE Adisankara College of Engineering & Technology Gdr, Nellore district, India

More information

Firewall Feature Overview

Firewall Feature Overview PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content

More information

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000 Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed

More information

A Contemporary Approach

A Contemporary Approach BORICP01.doc - 1 Second Edition Edcational Psychology A Contemporary Approach Gary D. Borich The University of Texas at Astin Martin L. Tombari University of Denver (This pblication may be reprodced for

More information

High Availability for Internet Information Server Using Double-Take 4.x

High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks

More information

A taxonomy of knowledge management software tools: origins and applications

A taxonomy of knowledge management software tools: origins and applications Evalation and Program Planning 25 2002) 183±190 www.elsevier.com/locate/evalprogplan A taxonomy of knowledge management software tools: origins and applications Peter Tyndale* Kingston University Bsiness

More information

Designing a TCP/IP Network

Designing a TCP/IP Network C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation

More information

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7

Introducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7 Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices

More information

6 Funding and Staffing the Central IT Help Desk

6 Funding and Staffing the Central IT Help Desk 6 Fnding and Staffing the Central IT Help Desk Money may kindle, bt it cannot itself, or for very long, brn. Igor Stravinsky Key Findings At most instittions the central IT bdget is a major sorce of help

More information

Optimal control and piecewise parametric programming

Optimal control and piecewise parametric programming Proceedings of the Eropean Control Conference 2007 Kos, Greece, Jly 2-5, 2007 WeA07.1 Optimal control and piecewise parametric programming D. Q. Mayne, S. V. Raković and E. C. Kerrigan Abstract This paper

More information

Candidate: Suzanne Maxwell. Date: 09/19/2012

Candidate: Suzanne Maxwell. Date: 09/19/2012 Medical Coder / Billing Clerk Assessment Report Szanne Maxwell 09/19/2012 www.resorceassociates.com Szanne Maxwell 09/19/2012 Prepared For: NAME Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D., Licensed

More information

Document management and records (based in part upon materials by Frank Upward and Robert Hartland)

Document management and records (based in part upon materials by Frank Upward and Robert Hartland) Today s lectre IMS1603 Lectre 21 What does docment management entail? Docment management and records (based in part pon materials by Frank Upward and Robert Hartland) www.monash.ed. a Thinking more abot

More information

The Intelligent Choice for Disability Income Protection

The Intelligent Choice for Disability Income Protection The Intelligent Choice for Disability Income Protection provider Pls Keeping Income strong We prposeflly engineer or disability income prodct with featres that deliver benefits sooner and contine paying

More information

Facilities. Car Parking and Permit Allocation Policy

Facilities. Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Facilities Car Parking and Permit Allocation Policy Contents Page 1 Introdction....................................................2 2.0 Application

More information

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds

Herzfeld s Outlook: Seasonal Factors Provide Opportunities in Closed-End Funds VIRTUS HERZFELD FUND Herzfeld s Otlook: Seasonal Factors Provide Opportnities in Closed-End Fnds When it comes to investing in closed-end fnds, a comprehensive nderstanding of the inefficiencies of the

More information

How To Link Data Across Agencies

How To Link Data Across Agencies Rasterized 300 dpi Linking Data across Agencies: States That Are Making It Work Updated March 2010 By: Rebecca Carson and Elizabeth Laird, Data Qality Campaign; Elizabeth Gaines and Thaddes Ferber, The

More information

Health Care ID Card Enhancements

Health Care ID Card Enhancements State of California Health Care Enhancements Incorporating National WEDI Indstry Card Standards and the UnitedHealthcare Branding Transition UnitedHealthcare is the first health company to se the national

More information

FaceTrust: Assessing the Credibility of Online Personas via Social Networks

FaceTrust: Assessing the Credibility of Online Personas via Social Networks FaceTrst: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos Kyngbaek Kim Xiaowei Yang Dke University University of California, Irvine Dke University msirivia@cs.dke.ed

More information

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1

The Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1 The Botiqe Premim Do Botiqe Investment Managers Create Vale? AMG White Paper Jne 2015 1 Exective Smmary Botiqe active investment managers have otperformed both non-botiqe peers and indices over the last

More information

Sample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification

Sample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification Sample Pages Edgar Dietrich, Alfred Schlze Measrement Process Qalification Gage Acceptance and Measrement Uncertainty According to Crrent Standards ISBN: 978-3-446-4407-4 For frther information and order

More information

STI Has All The Pieces Hardware Software Support

STI Has All The Pieces Hardware Software Support STI Has All The Pieces Hardware Software Spport STI has everything yo need for sccessfl practice management, now and in the ftre. The ChartMaker Medical Site Incldes: Practice Management/Electronic Billing,

More information

Inferring Continuous Dynamic Social Influence and Personal Preference for Temporal Behavior Prediction

Inferring Continuous Dynamic Social Influence and Personal Preference for Temporal Behavior Prediction Inferring Continos Dynamic Social Inflence and Personal Preference for Temporal Behavior Prediction Jn Zhang 1,2,3,4 Chaokn Wang 2,3,4 Jianmin Wang 2,3,4 Jeffrey X Y 5 1 Department of Compter Science and

More information

Candidate: Cassandra Emery. Date: 04/02/2012

Candidate: Cassandra Emery. Date: 04/02/2012 Market Analyst Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. 04/02/2012 Prepared For: Resorce Associates Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D.,

More information

Candidate: Kevin Taylor. Date: 04/02/2012

Candidate: Kevin Taylor. Date: 04/02/2012 Systems Analyst / Network Administrator Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. 04/02/2012 Prepared For: Resorce Associates Prepared by: John Lonsbry,

More information

EMC VNX Series Setting Up a Unisphere Management Station

EMC VNX Series Setting Up a Unisphere Management Station EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre

More information

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t

Executive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t Exective Coaching to Activate the Renegade Leader Within Renegades Do What Others Won t To Get the Reslts that Others Don t Introdction Renegade Leaders are a niqe breed of leaders. The Renegade Leader

More information

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg

More information

Evolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending

Evolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Evoltionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Abstract Xiaoyn Liao G. Gary Wang * Dept. of Mechanical & Indstrial Engineering, The University of Manitoba Winnipeg, MB,

More information

Apache Hadoop. The Scalability Update. Source of Innovation

Apache Hadoop. The Scalability Update. Source of Innovation FILE SYSTEMS Apache Hadoop The Scalability Update KONSTANTIN V. SHVACHKO Konstantin V. Shvachko is a veteran Hadoop developer. He is a principal Hadoop architect at ebay. Konstantin specializes in efficient

More information

Flexible, Low-overhead Event Logging to Support Resource Scheduling

Flexible, Low-overhead Event Logging to Support Resource Scheduling Flexible, Low-overhead Event Logging to Spport Resorce Schedling Jan Stoess University of Karlsrhe Germany stoess@ira.ka.de Volkmar Uhlig IBM T.J. Watson Research Center New York vhlig@s.ibm.com Abstract

More information

Purposefully Engineered High-Performing Income Protection

Purposefully Engineered High-Performing Income Protection The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits

More information

An accelerated Branch-and-Bound algorithm for assignment problems of utility systems

An accelerated Branch-and-Bound algorithm for assignment problems of utility systems Compters and Chemical Engineering 6 (00) 67 630 www.elsevier.com/locate/compchemeng An accelerated Branch-and-Bond algorithm for assignment problems of tility systems Alexandros M. Strovalis a, Istvan

More information

Phone Banking Terms Corporate Accounts

Phone Banking Terms Corporate Accounts Phone Banking Terms Corporate Acconts If there is any inconsistency between the terms and conditions applying to an Accont and these Phone Banking Terms, these Phone Banking Terms prevail in respect of

More information

5 Using Your Verbatim Autodialer

5 Using Your Verbatim Autodialer 5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before

More information

Btrieve Programmer s Reference

Btrieve Programmer s Reference Btrieve Programmer s Reference Copyright 1998 Pervasive Softare Inc. All rights reserved orldide. Reprodction, photocopying, or transmittal of this pblication, or portions of this pblication, is prohibited

More information

3 Distance in Graphs. Brief outline of this lecture

3 Distance in Graphs. Brief outline of this lecture Distance in Graphs While the preios lectre stdied jst the connectiity properties of a graph, now we are going to inestigate how long (short, actally) a connection in a graph is. This natrally leads to

More information

Mobility Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Networks

Mobility Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Networks Mobilit Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton, FL 33431

More information

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...

Technical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements... PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring

More information