Skip to main content
    • Aa
    • Aa

A rewriting framework and logic for activities subject to regulations


Activities such as clinical investigations (CIs) or financial processes are subject to regulations to ensure quality of results and avoid negative consequences. Regulations may be imposed by multiple governmental agencies as well as by institutional policies and protocols. Due to the complexity of both regulations and activities, there is great potential for violation due to human error, misunderstanding, or even intent. Executable formal models of regulations, protocols and activities can form the foundation for automated assistants to aid planning, monitoring and compliance checking. We propose a model based on multiset rewriting where time is discrete and is specified by timestamps attached to facts. Actions, as well as initial, goal and critical states may be constrained by means of relative time constraints. Moreover, actions may have non-deterministic effects, i.e. they may have different outcomes whenever applied. We present a formal semantics of our model based on focused proofs of linear logic with definitions. We also determine the computational complexity of various planning problems. Plan compliance problem, for example, is the problem of finding a plan that leads from an initial state to a desired goal state without reaching any undesired critical state. We consider all actions to be balanced, i.e. their pre- and post-conditions have the same number of facts. Under this assumption on actions, we show that the plan compliance problem is PSPACE-complete when all actions have only deterministic effects and is EXPTIME-complete when actions may have non-deterministic effects. Finally, we show that the restrictions on the form of actions and time constraints taken in the specification of our model are necessary for decidability of the planning problems.

Linked references
Hide All

This list contains references from the content that can be linked to their source. For a full set of references and notes please see the PDF or HTML where available.

R. Alur and D. Dill (1994). A theory of timed automata. Theoretical Computer Science 126 183235.

J.-M. Andreoli (1992). Logic programming with focusing proofs in linear logic. Journal of Logic and Computation 2 (3) 297347.

Kozen D. C. Chandra and L. J. Stockmeyer (1981). Alternation. Journal of the ACM 28 114133.

R. Corin , S. Etalle , P. H. Hartel and A. Mader (2007). Timed analysis of security protocols. Journal of Computer Security 15 (6) 619645.

N. A. Durgin , P. Lincoln , J. C. Mitchell and A. Scedrov (2004). Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security 12 (2) 247311.

M. A. Harrison , W. L. Ruzzo and J. D. Ullman (1975). On protection in operating systems. In: SOSP'75: Proceedings of the 5th ACM Symposium on Operating Systems Principles, New York, NY, USA, ACM 1424.

J. S. Hodas and D. Miller (1994). Logic programming in a fragment of intuitionistic linear logic. Information and Computation 110 (2) 327365.

M. Kanovich , T. Ban Kirigin , V. Nigam and A. Scedrov (2014). Bounded memory Dolev-Yao adversaries in collaborative systems. Information and Computation 238 233261.

M. I. Kanovich , T. Ban Kirigin , V. Nigam and A. Scedrov (2013). Bounded memory protocols and progressing collaborative systems. In: J. Crampton , S. Jajodia and K. Mayes (eds.) ESORICS. Springer Lecture Notes in Computer Science, volume 8134, 309326.

M. I. Kanovich , T. Ban Kirigin , V. Nigam and A. Scedrov (2014). Bounded memory protocols. Computer Languages, Systems & Structures 40 (3-4) 137154.

M. I. Kanovich , M. Okada and A. Scedrov (1998). Specifying real-time finite-state systems in linear logic. Electronic Notes in Theoretical Computer Science 16 (1) 4259.

M. I. Kanovich , P. Rowe and A. Scedrov (2011). Collaborative planning with confidentiality. Journal of Automated Reasoning 46 (3–4) 389421.

M. I. Kanovich and J. Vauzeilles (2001). The classical ai planning problems in the mirror of horn linear logic: Semantics, expressibility, complexity. Mathematical Structures in Computer Science 11 (6) 689716.

P. E. Lam , J. C. Mitchell and S. Sundaram (2009). A formalization of HIPAA for a medical messaging system. In: S. Fischer-Hübner , C. Lambrinoudakis and G. Pernul (eds.) TrustBus. Springer Lecture Notes in Computer Science, volume 5695, 7385.

R. Lanotte , A. Maggiolo-Schettini and A. Troina (2010). Reachability results for timed automata with unbounded data structures. Acta Informatica 47 (5–6) 279311.

R. McDowell and D. Miller (2000). Cut-elimination for a logic with definitions and induction. Theoretical Computer Science 232 91119.

J. Meseguer (1992). Conditional Rewriting Logic as a unified model of concurrency. Theoretical Computer Science 96 (1) 73155.

M. Minsky (1961). Recursive unsolvability of post's problem of ‘tag’ and other topics in the theory of turing machines. Annals of Mathematics. 74 (3) 437455.

V. Nigam and D. Miller (2010). A framework for proof systems. Journal of Automated Reasoning 45 (2) 157188.

P. C. Ölveczky and J. Meseguer (2007). Abstraction and completeness for Real-Time Maude. Electronic Notes in Theoretical Computer Science 176 (4) 527.

Recommend this journal

Email your librarian or administrator to recommend adding this journal to your organisation's collection.

Mathematical Structures in Computer Science
  • ISSN: 0960-1295
  • EISSN: 1469-8072
  • URL: /core/journals/mathematical-structures-in-computer-science
Please enter your name
Please enter a valid email address
Who would you like to send this to? *


Full text views

Total number of HTML views: 0
Total number of PDF views: 32 *
Loading metrics...

Abstract views

Total abstract views: 177 *
Loading metrics...

* Views captured on Cambridge Core between September 2016 - 28th July 2017. This data will be updated every 24 hours.