Information Technology Reference
In-Depth Information
( ¯
As ψ and
D ,τ,i ) are the policy violations at
time point i . Note that we drop the outermost quantifier as we are interested
not only in whether the policy is violated. An instantiation of the free variables
x that satisfies ψ provides additional information about the violations.
¬
ϕ are equivalent, the tuples in
ψ
3.1 Monitorable Fragment
Not all formulas are effectively monitorable. Consider, for example, the policy
q ( x,y )thatweusefor
monitoring. There are infinitely many violations for time points i with p D i
x.
y.p ( x )
q ( x,y ) with the formula ψ = p ( x )
∧¬
=
,
( ¯
namely, any tuple ( a,b )
D ,τ,i )
is infinite and its elements cannot be enumerated in finite time. We define a
fragment of MFOTL Ω that guarantees finiteness. Furthermore, the set of viola-
tions at each time point can be effectively computed bottom-up over the formula
structure. In the following, we treat the Boolean connective
D
2
\
q D i with a
p D i .Insuchacase,
ψ
as a primitive.
Definition 4. The set
of monitorable formulas with respect to ( H p ) p∈ R r is
defined by the rules given in Figure 2, where H p ⊆{
F
1 ,...,ι ( p )
}
,foreach p
R r .
Let be a label of a rule from Figure 2. We say that a formula ϕ
∈F
is of kind
if there is a derivation tree for ϕ having as root a rule labeled by .
Before describing some of the rules, we first explain the meaning of the set H p ,
for p
R r with arity k .Theset H p contains the indexes j for which we can
determine the values of the variable x j that satisfy p ( x 1 ,...,x k ), given that
the values of the variables x i with i
= j are fixed. Formally, given a temporal
database ( ¯
, τ ) and a rigid predicate symbol p of arity k> 0, we say that
an index j ,with1
D
k− 1 ,theset
j
k ,is effective for p if for any a
D
p D }
{
d
D |
( a 1 ,...,a j− 1 ,d,a j ,...,a k− 1 )
is finite. For instance, for the rigid
predicate
, the set of effective indexes is H =
{
1 , 2
}
. Similarly, for the rigid
predicate
.
We describe the intuition behind the first four rules in Figure 2. The meaning
of the other rules should then be obvious. The first rule ( FLX ) requires that in
an atomic formula p ( t ) with p
N , defined as a
N b iff a,b
N
and a<b ,wehave H N :=
{
1
}
R f ,theterms t i are pairwise distinct variables.
This formula is monitorable since we assume that p 's interpretation is always a
finite relation. For the rules ( RIG )and( RIG ∧¬ ), consider formulas of the form
ϕ
R r and ι ( p )
p ( t )and ϕ
p ( t ) with p
fv ( ϕ ). In both cases,
the second conjunct restricts on the tuples satisfying ϕ . A simple example is
the formula p ( x,y )
∧¬
i =1 fv ( t i )
y .If ϕ is monitorable, such a formula is also
monitorable as its evaluation can be performed by filtering out the tuples in
x +1
ϕ
that do not satisfy the second conjunct. The rule ( RIG
) treats the case where
one of the terms t i is a variable that does not appear in ϕ . We require here that
the index j is effective, so that the values of this variable are determined by the
values of the other variables, which themselves are given by the tuples in
ϕ
.
An example is the formula p ( x,y )
x + y . The required conditions on t j
are necessary. If j is not effective, then we cannot guarantee finiteness. Consider,
e.g., the formula q ( x )
z
x
y .If t j is neither a variable nor a constant, then we
 
Search WWH ::




Custom Search