Advertisement

Formal Methods in System Design

, Volume 46, Issue 3, pp 262–285 | Cite as

Monitoring of temporal first-order properties with aggregations

  • David Basin
  • Felix Klaedtke
  • Srdjan Marinovic
  • Eugen Zălinescu
Article

Abstract

In system monitoring, one is often interested in checking properties of aggregated data. Current policy monitoring approaches are limited in the kinds of aggregations they handle. To rectify this, we extend an expressive language, metric first-order temporal logic, with aggregation operators. Our extension is inspired by the aggregation operators common in database query languages like SQL. We provide a monitoring algorithm for this enriched policy specification language. We show that, in comparison to related data processing approaches, our language is better suited for expressing policies, and our monitoring algorithm has competitive performance.

Keywords

Runtime verification Monitoring System compliance Temporal logic Aggregation operators 

Notes

Acknowledgments

This work was partially supported by the Zurich Information Security and Privacy Center (ZISC).

References

  1. 1.
    Abiteboul S, Hull R, Vianu V (1995) Foundations of databases. Addison-Wesley Longman Publishing Co., Inc., BostonzbMATHGoogle Scholar
  2. 2.
    Arasu A, Babcock B, Babu S, Datar M, Ito K, Motwani R, Nishizawa I, Srivastava U, Thomas D, Varma R, Widom J (2003) STREAM: the Stanford stream data manager. IEEE Data Eng Bull 26(1):19–26Google Scholar
  3. 3.
    Arasu A, Babu S, Widom J (2006) The CQL continuous query language: semantic foundations and query execution. VLDB J 15(2):121–144CrossRefGoogle Scholar
  4. 4.
    Barringer H, Goldberg A, Havelund K, Sen K (2004) Rule-based runtime verification. In: Proceedings of the 5th international conference on verification, model checking and abstract interpretation (VMCAI’04). Lecture notes in computer science, vol 2937, pp 44–57Google Scholar
  5. 5.
    Basin D, Harvan M, Klaedtke F, Zălinescu E (2012) MONPOLY: Monitoring usage-control policies. In: Proceedings of the 2nd international conference on runtime verification (RV’11). Lecture notes in computer science, vol 7186, pp 360–364Google Scholar
  6. 6.
    Basin D, Harvan M, Klaedtke F, Zălinescu E (2013) Monitoring data usage in distributed systems. IEEE Trans Softw Eng 39(10):1403–1426CrossRefGoogle Scholar
  7. 7.
    Basin D, Klaedtke F, Marinovic S, Zălinescu E (2013) Monitoring of temporal first-order properties with aggregations. In: Proceedings of the 4th international conference on runtime verification (RV’13). Lecture notes in computer science, vol 8174, pp 40–58Google Scholar
  8. 8.
    Basin D, Klaedtke F, Müller S, Pfitzmann B (2008) Runtime monitoring of metric first-order temporal properties. In: Proceedings of the 28th conference on foundations of software technology and theoretical computer science (FSTTCS’08). Leibniz international proceedings in informatics (LIPIcs), vol 2, pp 49–60Google Scholar
  9. 9.
    Basin D, Klaedtke F, Zălinescu E (2012) Algorithms for monitoring real-time properties. In: Proceedings of the 2nd international conference on runtime verification (RV’11). Lecture notes in computer science, vol 7186, pp 260–275Google Scholar
  10. 10.
    Bauer A, Goré R, Tiu A (2009) A first-order policy language for history-based transaction monitoring. In: Proceedings of the 6th international colloquium on theoretical aspects of computing (ICTAC’09). Lecture notes in computer science, vol 5684, pp 96–111Google Scholar
  11. 11.
    Bianculli D, Ghezzi C, Pietro PS (2013) The tale of SOLOIST: A specification language for service compositions interactions. In: Proceedings of the 9th international symposium on formal aspects of component software (FACS’12). Lecture notes in computer science, vol 7684, pp 55–72Google Scholar
  12. 12.
    Chomicki J (1995) Efficient checking of temporal integrity constraints using bounded history encoding. ACM Trans Database Syst 20(2):149–186CrossRefGoogle Scholar
  13. 13.
    Chomicki J, Toman D, Böhlen MH (2001) Querying ATSQL databases with temporal logic. ACM Trans Database Syst 26(2):145–178zbMATHCrossRefGoogle Scholar
  14. 14.
    Colombo C, Gauci A, Pace GJ (2010) LarvaStat: Monitoring of statistical properties. In: Proceedings of the 1st international conference on runtime verification (RV’10). Lecture notes in computer science, vol 6418, pp 480–484Google Scholar
  15. 15.
    Cranor C, Johnson T, Spataschek O, Shkapenyuk V (2003) Gigascope: A stream database for network applications. In: Proceedings of the 2003 ACM SIGMOD international conference on management of data, pp 647–651Google Scholar
  16. 16.
    D’Angelo B, Sankaranarayanan S, Sánchez C, Robinson W, Finkbeiner B, Sipma HB, Mehrotra S, Manna Z (2005) LOLA: Runtime monitoring of synchronous systems. In: Proceedings of the 12th international symposium on temporal representation and reasoning (TIME’05), pp 166–174Google Scholar
  17. 17.
    Finkbeiner B, Sankaranarayanan S, Sipma H (2005) Collecting statistics over runtime executions. Form Methods Syst Des 27(3):253–274zbMATHCrossRefGoogle Scholar
  18. 18.
    Garcia-Molina H, Ullman JD, Widom J (2009) Database systems: the complete book. Pearson Education, HarlowGoogle Scholar
  19. 19.
    Hallé S, Villemaire R (2012) Runtime enforcement of web service message contracts with data. IEEE Trans Serv Comput 5(2):192–206CrossRefGoogle Scholar
  20. 20.
    Hella L, Libkin L, Nurmonen J, Wong L (2001) Logics with aggregate operators. J ACM 48(4):880–907zbMATHMathSciNetCrossRefGoogle Scholar
  21. 21.
    Koymans R (1990) Specifying real-time properties with metric temporal logic. Real-Time Syst 2(4):255–299CrossRefGoogle Scholar
  22. 22.
    Owe O (1993) Partial logics reconsidered: a conservative approach. Form Asp Comput 5(3):208–223zbMATHMathSciNetCrossRefGoogle Scholar
  23. 23.
    PostgreSQL Global Development Group. PostgreSQL, Version 9.1.4, 2012. http://www.postgresql.org/
  24. 24.
    Sistla AP, Wolfson O (1995) Temporal conditions and integrity constraints in active database systems. In: Proceedings of the 1995 ACM SIGMOD international conference on management of data, pp 269–280Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • David Basin
    • 1
  • Felix Klaedtke
    • 2
  • Srdjan Marinovic
    • 1
  • Eugen Zălinescu
    • 1
  1. 1.Computer Science DepartmentInstitute of Information SecurityZurichSwitzerland
  2. 2.NEC Europe Ltd.HeidelbergGermany

Personalised recommendations