×

Sheaf tools for computation. (English) Zbl 1130.18007

The paper presents first how we can compute sheaf tools for accomplishing our goal, i.e., an authentication method by sheaves. The authors use the most general notion of a sheaf, as a functor on a site, which is a category equipped with a Grothendieck topology. Moreover, they have introduced a notion in sheaf theory, family for matching, in order to simplify the sheaf definition in a computation class of sites called well structured sites. This has given them the possibility to construct an optimal validation algorithm of sheaves. Also, they present an algorithm to generate sheaves. By handling the concepts of Goguen, the behaviour of a system is computed in the internal language of a (pre)sheaf topos. Non-interference by Goguen is also computed in the internal language of a presheaf topos by using predicates.
Consequently, this paper provides computation tools for authentication and for non-interference control. In particular, the authors see that all computation tools are building from the base category that is provided by the architecture of distributed computing systems. It remains for them to try these out. Only, a software built in accordance with the ideas of this paper can provide real examples. The authors plan to implement this in the future.

MSC:

18F20 Presheaves and sheaves, stacks, descent conditions (category-theoretic aspects)
18A05 Definitions and generalizations in theory of categories
18B25 Topoi
18A15 Foundations, relations to logic and deductive systems
18F10 Grothendieck topologies and Grothendieck topoi
68Q85 Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.)
Full Text: DOI

References:

[1] Tony Clark. A semantics for object-oriented systems (1999). Available from: <http://www.dcs.kcl.ac.uk/staff/tony/docs/OOSemantics.ps>.; Tony Clark. A semantics for object-oriented systems (1999). Available from: <http://www.dcs.kcl.ac.uk/staff/tony/docs/OOSemantics.ps>.
[2] Goguen, Joseph A., Sheaf semantics for concurrent interacting objects, Mathematical Structures in Computer Science, 2, 159-191 (1991) · Zbl 0763.18005
[3] Lambek, J.; Scott, P. J., Introduction to higher order categorial logic, Cambridge Studies in Advanced Mathematics, 7 (1989) · Zbl 0642.03002
[4] Mac Lane, Saunders; Moerdijk, Ieke, Sheaves in Geometry and Logic, A First Introduction to Topos Theory (1991), Springer-Verlag · Zbl 0822.18001
[5] Prouté, Alain, On the Role of Description, Journal of Pure and Applied Algebra, 158 (2001) · Zbl 0983.18003
[6] Elena Şendroiu. Topos, un modèle pour l’informatique. Ph.D. thesis, University of Paris 7, December 2004.; Elena Şendroiu. Topos, un modèle pour l’informatique. Ph.D. thesis, University of Paris 7, December 2004.
[7] Elena Şendroiu. From anti-virus to sheaf tools for security, in: U.E. Gattiker (Ed.), (EICAR 2004) Conference CD-rom: Other Contributions, Copenhagen, EICAR e.V, ISBN: 67-987271-6-8, 18p.; Elena Şendroiu. From anti-virus to sheaf tools for security, in: U.E. Gattiker (Ed.), (EICAR 2004) Conference CD-rom: Other Contributions, Copenhagen, EICAR e.V, ISBN: 67-987271-6-8, 18p.
[8] Elena Şendroiu. Sheaf algorithms, in: Proceedings of the 6th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2004), Timişoara, ISBN: 67-987271-6-8, 12p.; Elena Şendroiu. Sheaf algorithms, in: Proceedings of the 6th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2004), Timişoara, ISBN: 67-987271-6-8, 12p.
[9] Elena Şendroiu. Sheaves in network security, in: Joint International Computer Conference (JICC 2004), Kumning, China, International Academic Publishers.; Elena Şendroiu. Sheaves in network security, in: Joint International Computer Conference (JICC 2004), Kumning, China, International Academic Publishers.
[10] Elena Şendroiu. Sheaf tools for network security, in: The 16th IASTED International Conference on Parallel and distributed computing and systems (IASTED-PDCS 2004), Cambridge, MA, USA. Available from: <http://www.iasted.org/conferences/2004/cambridge/c439.htm>.; Elena Şendroiu. Sheaf tools for network security, in: The 16th IASTED International Conference on Parallel and distributed computing and systems (IASTED-PDCS 2004), Cambridge, MA, USA. Available from: <http://www.iasted.org/conferences/2004/cambridge/c439.htm>.
[11] Elena Şendroiu. Presheaf and sheaf computation, extended abstract, in: International Conference of Computational Methods in Sciences and Engineering 2004 (ICCMSE 2004), Greece, in VSP International Science Publishers, P.O. Box 346, 3700 AH Zeist, The Netherlands, Lecture Series on Computer and Computational Sciences, vol. 1, 2004, pp. 471-474. Available from: <http://www.uop.gr/iccmse/index.htm>, <http://www.vsppub.com/books/mathe/cbk-IntConComMetSciEngICC200.html>.; Elena Şendroiu. Presheaf and sheaf computation, extended abstract, in: International Conference of Computational Methods in Sciences and Engineering 2004 (ICCMSE 2004), Greece, in VSP International Science Publishers, P.O. Box 346, 3700 AH Zeist, The Netherlands, Lecture Series on Computer and Computational Sciences, vol. 1, 2004, pp. 471-474. Available from: <http://www.uop.gr/iccmse/index.htm>, <http://www.vsppub.com/books/mathe/cbk-IntConComMetSciEngICC200.html>.
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.