DECENT: A Benchmark for Decentralized Enforcement

被引:1
|
作者
Gallay, Florian [1 ]
Falcone, Ylies [1 ]
机构
[1] Univ Grenoble Alpes, CNRS, Grenoble INP, Inria,LIG, F-38000 Grenoble, France
来源
关键词
RUNTIME ENFORCEMENT; TIMED PROPERTIES;
D O I
10.1007/978-3-031-17196-3_18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
DECENT is a benchmark for evaluating decentralized enforcement. It implements two enforcement algorithms that differ in their strategy for correcting the execution: the first one explores all alternatives to perform a globally optimal correction, while the second follows an incremental strategy based on locally optimal choices. Decent allows comparing these algorithms with a centralized enforcement algorithm in terms of computational metrics and metrics for decentralized monitoring such as the number and size of messages or the required computation on each component. Our experiments show that (i) the number of messages sent and the internal memory usage is much smaller with decentralized algorithms (ii) the locally optimal algorithm performs closely to the globally optimal one.
引用
收藏
页码:293 / 303
页数:11
相关论文
共 50 条
  • [41] Compact and decentralized supervisors for general constraint enforcement in Petri net models
    Basile, Francesco
    Cordone, Roberto
    Piroddi, Luigi
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 7279 - 7284
  • [42] D- GATE: Decentralized Geolocation and Time Enforcement for Usage Control
    zum Felde, Hendrik Meyer
    Reding, Jean -Luc
    Lux, Michael
    2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 386 - 395
  • [43] CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs
    Saremi, Fatemeh
    Mashayekhi, Hoda
    Movaghar, Ali
    Jalili, Rasool
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 427 - 434
  • [44] Decentralized Enforcement of k-Anonymity for Location Privacy Using Secret Sharing
    Foerster, David
    Loehr, Hans
    Kargl, Frank
    2015 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2015, : 279 - 286
  • [45] Different ways of blowing the whistle: Explaining variations in decentralized enforcement in the UK and France
    Etienne, Julien
    REGULATION & GOVERNANCE, 2015, 9 (04) : 309 - 324
  • [46] Decent
    Oliver, Anna Cypra
    FOURTH GENRE-EXPLORATIONS IN NONFICTION, 2005, 7 (02) : 21 - 29
  • [47] Multi-objective optimization for decentralized PI control of the ALSTOM benchmark problem
    Huang, Chun-E
    Li, Donghai
    Liu, Zhongli
    Xue, Yali
    2015 34TH CHINESE CONTROL CONFERENCE (CCC), 2015, : 727 - 732
  • [48] How 'Decent' Is a Decent Minimum of Health Care?
    Ter Meulen, Ruud
    JOURNAL OF MEDICINE AND PHILOSOPHY, 2011, 36 (06): : 612 - 623
  • [49] Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy Enforcement
    Spanier, Adam
    Zhao, Rui
    Huang, Pei-Chi
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1518 - 1523