Keywords

1 Introduction

Resilience is a broadly used concept in computer science and software engineering (e.g., [11]). In general engineering systems, fast recovery from a degraded state is often termed as resilience, see, e.g., [17]. In view of the latter interpretation of resilience, we investigate on the question whether a \(\mathrm {SAFE}\) state can be reached in a bounded number of steps from any \(\mathrm {BAD}\) state (where \(\mathrm {BAD}\) is not necessarily the complement of \(\mathrm {SAFE}\)). This concept is meaningful for systems in which violation of \(\mathrm {SAFE}\) cannot be avoided. Our notion of resilience generalizes correctness (e.g., [2, 10, 15]) w.r.t. a safety condition.

For modeling systems, we use graph transformation systems (GTSs) in the single pushout approach (SPO), as considered, e.g., in [7], which provide visual interpretability but yet also a precise formalism. In this perception, system states are captured by graphs and state changes by graph transformations. Our goal is to obtain decidability results for GTSs by considering their induced transition systems. A transition system consists of a set of states of any kind (not necessarily graphs) and a transition relation on the state set.

Usually, the state set (set of graphs) is infinite. To handle infinite state sets, we employ the concept of well-structuredness studied, e.g., in [1, 9]. A well-structured transition system (WSTS) is, informally, a transition system equipped with a well-quasi-order satisfying that larger states simulate smaller states (also called compatibility condition) and that certain predecessor sets can be effectively computed. In this well-structured setting, ideal-based sets (upward- or downward-closed sets) play an important role. They enjoy a number of suitable properties for verification such as finite representation (of upward-closed sets) and closure properties. For WSTSs, the ideal reachability (coverability) problem is decidable [1, 9], which is an integrant of our results.

Well-structuredness of GTSs is investigated, e.g., in [12] for several well-quasi-orders. The well-quasi-order we use is the subgraph order which permits strong compatibility but comes with the restriction of path-length-boundedness on the graph class.

We show decidability for subclasses of GTSs of bounded path length. Each subclass exhibits additional requirements, i.e., effectiveness or unreliability properties. Additionally, we identify sufficient criteria of GTSs for the applicability of the results.

More precisely, we consider the explicit resilience problem where the bound on the number of steps for recovery is given and the bounded resilience problem which asks whether there exists such a bound. These problems are formulated for marked GTSs each of which consists of a GTS together with a graph class closed under rule application and an INITial subset of graphs. We ask: Starting from any graph in \(\mathrm {INIT}\), whenever we reach a \(\mathrm {BAD}\) graph, can we reach a \(\mathrm {SAFE}\) graph in \(\le k\) (in a bounded number of) steps?

To illustrate the idea of our resilience concept, we give an example.

Example (circular process protocol)

Consider a ring of three processes \(P_0, P_1, P_2\) each of which has an unordered collection (multiset) containing commands. Each command belongs to a process and is labeled accordingly as \(c_0,c_1,\) or \(c_2\). The protocol is described below. A formalization as GTS can be found in Sect. 4.

  • The process \(P_0\) liberal, i.e., it can initiate (generate) a command \(c_0\) in the collection of the next process.

  • Every process \(P_i\) can forward a command \(c_j\), \(i\ne j\), not belonging to itself.

  • If a process \(P_i\) receives a command \(c_i\), it is enabled and can

    1. 1.

      execute its specific process action, or

    2. 2.

      clear all commands in its collection and forward a command of the next process, or

    3. 3.

      leave the process ring (if \(i\ne 0\)) and forward a command of the next process.

    Afterwards, the command \(c_i\) is deleted.

  • Any command may get lost in any state.

The process action of \(P_0\) is to forward two commands, \(c_1\) and \(c_2\). The process action of \(P_1\) (\(P_2\)) is to forward a command \(c_2\) (\(c_1\)). The topology of the process ring changes when a process leaves the ring. Processes \(P_1\) and \(P_2\) can leave the ring only if the other process has not left the ring before. In Fig. 1, the initial state where every process \(P_i\) has one command \(c_i\) in its collection and the three possible topologies are shown. A process \(P_i\) is represented by an edge labeled with \(P_i\). The collections are represented by white nodes which may have loops labeled with \(c_i\) corresponding to the contained commands.

Fig. 1.
figure 1

Initial state and topologies of the circular process protocol.

Consider the following instances of the bounded resilience problem with the initial state as in Fig. 1:

figure a

For every instance of the bounded resilience problem, we are interested in a bound k for the number of steps needed for recovery. In the first instance, we ask whether we can reach a state where every process is enabled in \(\le k\) steps whenever we reach a state where this is not the case. In the second instance, we ask whether we can reach a state with a collection containing commands \(c_0 , c_1\) in \(\le k\) steps whenever we reach a state with a collection containing \(c_2\). The third instance is the “dual” problem to the first one where the constraints for \(\mathrm {BAD}\) and \(\mathrm {SAFE}\) are exchanged. In the fourth instance, we ask whether we can reach a state containing no three processes in \(\le k\) steps whenever we reach a state without commands. One may ask:

  • Does such a k exist? If so, what is the minimal k?

  • Is there a generic method for problems of this kind?

We will answer these questions in Sect. 3 and 4.

This paper is organized as follows: In Sect. 2, we recall preliminary concepts of GTSs and (WS)TSs. We show decidability of the resilience problems for subclasses of marked WSTSs in Sect. 3. In Sect. 4, we apply our results to marked GTSs. In Sect. 5, we give sufficient, rule-specific criteria for the applicability of our results. We present related concepts in Sect. 6 and close with a conclusion in Sect. 7. The proofs in full length and a further example can be found in a technical report [13].

2 Preliminaries

We recall the concepts used in this paper, namely graph transformation systems [6, 7] and (in particular well-structured) transition systems [9].

2.1 Graph Transformation Systems

In the following, we recall the definitions of graphs, graph constraints, rules, and graph transformation systems [6, 7].

A directed, labeled graph consists of a finite set of nodes and a finite set of edges where each edge is equipped with a source and a target node and where each node and edge is equipped with a label. Note that this kind of graphs are a special case of the hypergraphs considered in [12].

Definition 1 (graphs & morphisms)

A (directed, labeled) graph (over a finite label alphabet \(\varLambda =\varLambda _V\cup \varLambda _E\)) is a tuple \(G=\langle V_G,E_G, src _G, tgt _G, lab ^V_G, lab ^E_G\rangle \) with finite sets \(V_G\) and \(E_G\) of nodes (or vertices) and edges, functions \( src _G, tgt _G:E_G\rightarrow V_G\) assigning source and target to each edge, and labeling functions \( lab ^V_G:V_G\rightarrow \varLambda _V\), \( lab ^E_G:E_G\rightarrow \varLambda _E\). A (simple, undirected) path in \(G\) of length \(\ell \) is a sequence \(\langle v_1 , e_1 , v_2 \ldots , v_\ell , e_\ell v_{\ell +1}\rangle \) of nodes and edges s.t. \( src _G(e_i )=v_i\) and \( tgt _G(e_i )=v_{i+1}\), or \( tgt _G(e_i )=v_i\) and \( src _G(e_i )=v_{i+1}\) for every \(1 \le i \le \ell \), and all contained nodes and edges occur at most once. Given graphs \(G\) and \(H\), a (partial graph) morphism \(g: G\rightharpoonup H\) consists of partial functions \(g_V:V_G\rightharpoonup V_H\) and \(g_E:E_G\rightharpoonup E_H\) which preserve sources, targets, and labels, i.e., \(g_V\circ src _G(e)= src _H\circ g_E(e)\), \(g_V\circ tgt _G(e)= tgt _H\circ g_E(e)\), \( lab ^V_{G} (v)= lab ^V_{H}\circ g_V(v)\), and \( lab ^E_{G} (e)= lab ^E_{H}\circ g_E(e)\) on all nodes v and egdes e, for which \(g_V(v), g_E(e)\) is defined. Furthermore, if a morphism is defined on an edge, it must be defined on both incident nodes. The morphism g is total (injective) if both \(g_{V}\) and \(g_{E}\) are total (injective). If \(g\) is total and injective, we also write \(g: G\hookrightarrow H\). The composition of morphisms is defined componentwise. A pair \(\langle G \rightarrow C ,G'\rightarrow C\rangle \) of morphisms is jointly surjective if every item of C has a preimage in G or \(G'\).

Convention

We draw graphs as usual. Labels are indicated by a symbol or a color. In (partial) morphisms, we equip the image of a node with the same index. Nodes on which the morphism is undefined have no index.

We consider a special case of graph constraints [10, 16], which are non-nested and based on positive (\(\exists G\))/negative (\(\lnot \exists G\)) constraints. For simplicity, we call them also positive (negative) constraints.

Definition 2 (positive & negative constraints)

The class of positive (negative) (graph) constraints is the smallest class of expressions which contains \(\exists G\) (negative: \(\lnot \exists G\)) for every graph G and is closed under \(\vee \) and \(\wedge \). A graph G satisfies \(\exists G'\) if there exists a total, injective morphism \(G' \hookrightarrow G\). The semantics of the logical operators are as usual. We write \(G \models c\) if G satisfies the positive/negative constraint c. For a positive/negative constraint c, we denote by \([\![c\; \!]\!]\) the set of all graphs G of the considered graph class with \(G \models c\).

Using jointly surjective morphisms, every positive constraint can algorithmically be converted into an equivalent “\(\vee \)-normal form”.

Fact 1

(from \(\wedge \) to \(\vee \)). For every positive contraint c, we can effectively construct a positive constraint \(c'\) of the form \(\bigvee _{1\le i\le n} \exists G_i\) s.t. \([\![c\;\!]\!]=\![\![c'\;\!]\!]\) and there exists no total, injective morphism \(G_i \hookrightarrow G_j\) for \(i\ne j\).

We use the single pushout (SPO) approach [7] with injective matches for modeling graph transformations.

Definition 3 (graph transformation)

A (graph transformation) rule \(r=\langle L \rightharpoonup R\rangle \) is a partial morphism from a graph L to a graph R. A graph transformation system (GTS) is a finite set of rules. A transformation \(G \Rightarrow H\) from a graph G to a graph H applying a rule r at a total, injective match morphism \(g: L \hookrightarrow G\) is given by a pushout as shown in Fig. 2 (1) (for existence and construction of pushouts, see, e.g., [7]). We write \(G \Rightarrow _r H\) to indicate the applied rule, and \(G \Rightarrow _\mathcal {R}H\) if \(G \Rightarrow _r H\) for a rule r in the rule set \(\mathcal {R}\).

In Fig. 2 (2), an example for a transformation is shown.

Fig. 2.
figure 2

Pushout scheme and example of a transformation.

2.2 Transition Systems and Well-structuredness

We recall the notion of transition systems.

Definition 4 (transition system)

A transition system (TS) \(\langle S,\rightarrow \rangle \) consists of a (possibly infinite) set \(S\) of states and a transition relation \(\rightarrow \subseteq S\times S\). Let \(\rightarrow ^0=\mathrm {Id}_S\) (identitiy on \(S\)), \(\rightarrow ^1=\rightarrow \), and \(\rightarrow ^k = \rightarrow ^{k-1} \circ \rightarrow \) for every \(k\ge 2\). Let \(\rightarrow ^{\le k} = \bigcup _{0 \le j\le k} \rightarrow ^j\) for every \(k\ge 0\). The transitive closure is given by \(\rightarrow ^*= \bigcup _{k \ge 0} \rightarrow ^k\).

Often we are interested in the predecessors or successors of state set.

Definition 5 (pre- & postsets)

Let \(\langle S,\rightarrow \rangle \) be a transition system. For \(S' \subseteq S\) and \(k\ge 0\), we define \(\mathrm {pre}^k (S') =\{s \in S\ \vert \ \exists s' \in S': s \rightarrow ^k s' \}\) and \(\mathrm {post}^k (S') = \{s \in S\ \vert \ \exists s' \in S' :s' \rightarrow ^k s \} \). Let \(\mathrm {pre}^{\le k} (S') = \bigcup _{ j \le k} \mathrm {pre}^j(S')\), \(\mathrm {pre}^* (S') = \bigcup _{k \ge 0} \mathrm {pre}^k(S')\), \(\mathrm {post}^{\le k} (S') = \bigcup _{ j \le k} \mathrm {post}^j(S')\), and \(\mathrm {post}^* (S') = \bigcup _{k \ge 0} \mathrm {post}^k(S')\). We abbreviate \( \mathrm {post}^1(S') \) by \( \mathrm {post}(S') \) and \(\mathrm {pre}^1 (S')\) by \(\mathrm {pre}(S)\). A TS \(\langle S,\rightarrow \rangle \) is finite-branching if \( \mathrm {post}(s) \) is finite and computable for every given state s.

Several problems are undecidable for infinite-state TSs in general. However, interesting decidability results can be achieved if the system is well-structured [1, 9, 12]. A prerequisite for this concept is a well-quasi-order on the state set.

Definition 6 (well-quasi-order)

A quasi-order is a reflexive, transitive relation. A well-quasi-order (wqo) over a set X is a quasi-order \(\le \subseteq X \times X \) s.t. every infinite sequence \(\langle x_0, x_1, \ldots \rangle \) in X contains an increasing pair \(x_i \le x_j\) with \(i <j\). A (well-)quasi-order is decidable if it can be decided whether \(x \le x'\) for all \(x,x' \in X\).

In our setting, the subgraph order is of crucial importance.

Example 1 (subgraph order)

 The subgraph order \( \le \) is given by \(G\le H\) iff there is a total, injective morphism \(G \hookrightarrow H\). Let \(S_\ell \) be a graph class of bounded path length (with bound \( \ell \)). The restriction of \(\le \) to \(S_\ell \) is a wqo [4, 12]. However, it is not a wqo on all graphs: The infinite sequence of cyclic graphs of increasing length contains no increasing pair.

Assumption

From now on, we implicitly equip every set of graphs with the subgraph order. By “\(\le \)” we mean either an abstract wqo or the subgraph order.

Upward- and downward-closed sets are of special interest.

Definition 7 (ideal & basis)

Let X be a set and \( \le \) a quasi-order on X. For every subset A of X, we denote by \(\uparrow \!A=\{ x \in X \ \vert \ \exists a \in A : a \le x \}\) the upward-closure and \(\downarrow \!A=\{ x \in X \ \vert \ \exists a \in A : x \le a \}\) the downward-closure of A. An ideal \( I \subseteq X\) is an upward-closed set, i.e., \(\uparrow \! I = I \). An anti-ideal \( J \subseteq X\) is a downward-closed set, i.e., \(\downarrow \! J = J \). An (anti-)ideal is decidable if membership for every \(x \in X\) is decidable. A basis of an ideal \( I \) is a subset \( B \subseteq I \) s.t. (i) \(\uparrow \! B = I \) and (ii) \( b \ne b' \Rightarrow b \not \le b'\) for all \(b,b'\in B \).

Fact 2 (ideals of graphs)

For every positive (negative) constraint c, \([\![c\; \!]\!]\) is an (anti-)ideal.

Ideals are, in general, infinite but can be represented by finite bases (a minimal generating set), similar to algebraic structures.

Fact 3

(finite basis [1, Lemma 3.3]). Every ideal has a basis and every basis is finite, provided that the superset is equipped with a wqo. Given a finite set A, a basis of \(\uparrow \!A\) is computable, provided that the quasi-order is decidable.

Anti-ideals are the complements of ideals. Since an anti-ideal does not have an “upward-basis” in general, we will later demand that membership is decidable.

For well-structuredness, we demand that the wqo yields a simulation of smaller states by larger states. This condition is called compatibility.

Definition 8 (well-structured transition systems)

Let \(\langle S,\rightarrow \rangle \) be transition system and \(\le \) a decidable wqo on \( S\). The tuple \(\langle S,\le ,\rightarrow \rangle \) is a well-structured transition system (WSTS), if:

  1. (i)

    The wqo is compatible with the transition relation, i.e., for all \(s_1, s'_1, s_2 \in S\) with \(s_1 \le s'_1\) and \(s_1 \rightarrow s_2\), there exists \(s'_2 \in S\) with \( s_2\le s'_2 \) and \(s_1' \rightarrow ^* s'_2\). If \(s'_1 \rightarrow ^1 s'_2\), we say that it is strongly compatible. Both is illustrated in Fig. 3.

  2. (ii)

    For every \(s \in S\), a basis of \(\uparrow \!\mathrm {pre}(\uparrow \!\{s\})\) is computable.

Fig. 3.
figure 3

Visualization of (strong) compatibility.

A strongly WSTS (SWSTS) is a WSTS with strong compatibility.

Remark

For GTSs, strong compatibility is achieved by applying the same rule to the bigger graph. In contrast to the double pushout (DPO) approach [6], SPO has the suitable property that every rule is applicable to the bigger graph.

Assumption

Let \( \langle S,\le , \rightarrow \rangle \) be a well-structured transition system.

The set of ideals of \(S\) is closed under preset, union, and intersection.

Fact 4

(stability of ideals [1, Lemma 3.2]). For ideals \( I , I ' \subseteq S\), the sets \(\mathrm {pre}^*( I )\), \( I \cup I '\), and \( I \cap I '\) are ideals. For SWSTSs, the sets \(\mathrm {pre}( I )\), \(\mathrm {pre}^{\le k}( I )\) for every \(k\ge 0\) are ideals.

An important point in our argumentation is the observation that every infinite, ascending sequence of ideals w.r.t. a wqo eventually becomes stationary.

Lemma 1

(Noetherian state set [1, Lemma 3.4]). For every infinite, ascending sequence \(\langle I _0 \subseteq I _1 \subseteq \ldots \rangle \) of ideals, \(\exists k_0\ge 0\) s.t. \( I _{k}= I _{k_0}\) for all \(k \ge k_0\).

Abdulla et al. [1] exploit Lemma 1 to show the decidability of ideal reachability (coverability) for SWSTSs. The idea is to iteratively construct the sequence of the ideals \( I ^k= \mathrm {pre}^{\le k} ( I )\) until it becomes stable. This construction is carried out by representing ideals by bases. This argumentation is similarly feasible for WSTSs, see, e.g., [9, proof of Thm. 3.6].

Lemma 2

(ideal reachability [1, Thm. 4.1]). Given a basis of an ideal \( I \subseteq S\) and a state s of a SWSTS, we can decide whether we can reach a state \(s_ I \in I \) from s. In particular, \(\mathrm {pre}^{\le k}( I )=\mathrm {pre}^* ( I )\) \(\Longleftrightarrow \) \(\mathrm {pre}^{\le k+1}( I )=\mathrm {pre}^{\le k}( I )\), and a basis of \(\mathrm {pre}^*( I )\) is computable.

3 Decidability

We show the decidability of resilience problems for subclasses of SWSTSs by extending the idea in [14] to a systematic investigation.

In our setting, ideal-based sets of states play an important role.

Definition 9 (ideal-based)

A set is ideal-based if it is (i) an ideal with a given basis, or (ii) a decidable anti-ideal. We denote by

figure b

We formulate resilience problems for marked WSTSs, i.e., WSTSs with a specified set \(\mathrm {INIT}\) of inital states starting from which we investigate resilience.

Definition 10 (marked WSTS)

A marked WSTS is a tuple \(\langle S,\le ,\rightarrow ,\mathrm {INIT}\rangle \) where \(\langle S,\le ,\rightarrow \rangle \) is a WSTS and \(\mathrm {INIT}\subseteq S\). If \(\mathrm {INIT}\) is finite, we call it fin-marked.

figure c
figure d

For our further considerations, we regard requirements in order to obtain decidability, i.e., we consider the following subclasses of marked WSTSs.

Definition 11 (requirements)

A marked WSTS \(\langle S,\le ,\rightarrow ,\mathrm {INIT}\rangle \) is

  1. (1)

    post\(^*\)-effective if \(\mathrm {INIT}\) is finite and a basis of \(\uparrow \!\mathrm {post}^* (\mathrm {INIT})\) is computable,

  2. (2)

    lossy if \(\downarrow \!\mathrm {post}^*(\mathrm {INIT}) =\mathrm {post}^*(\mathrm {INIT})\),

  3. (3)

    \(\bot \)-bounded (bottom-bounded) if there exists \(\ell \ge 0\) s.t. \(s_B \in \mathrm {post}^{\le \ell } (s)\) for every \(s \in S\) and every element \(s_B\) of a basis of \(S\) with \(s \ge s_B\).

The requirement of \(\mathrm {post}^*\)-effectiveness describes the computability of the smallest reachable states from the initital states. The notion of lossiness means that the set of reachable states from the initital states is downward-closed. This is an abstraction from the lossiness concept in [9, p. 83]. Usually, the term “lossy” describes the circumstance that (almost) any piece of information of a state may get lost. Another kind of unreliability is \(\bot \)-boundedness which means that from every state, every smaller basis element (the bottom underneath) is reachable in a bounded number of steps. Thereby (almost) all information of a state may get lost in a bounded of number of steps.

The following lemma is crucial for many following proofs.

Lemma 3

(ideal-inclusion [14, Lemma 4]). Let A be a set, \( I \) an ideal, and \( J \) an anti-ideal. Then, \( A \cap J \subseteq I \Longleftrightarrow \uparrow \!A \cap J \subseteq I .\)

Applying this lemma to a basis \(B_ I \) of an ideal \( I \), we obtain that the inclusion \( I \cap J \subseteq I '\) in an ideal \( I '\) can be checked by computing \(B_ I \cap J \) and then checking whether \(B_ I \cap J \subseteq I '\).

We give a characterization of \(\mathrm {post}^*\)-effectiveness via “anti-ideal reachability”.

Proposition 1

(characterization of post\(^*\)-effectiveness). For a class of finite-branching WSTSs, a basis of \(\uparrow \!\mathrm {post}^*(s)\) is computable for every given state s iff the anti-ideal reachability problem is decidable, i.e., given a state s of a WSTS in the regarded class and a decidable anti-ideal \( J \), it can be decided whether \(\exists s' \in J : s \rightarrow ^* s'\).

Proof (sketch)

On one hand, we can decide the anti-ideal reachability problem by computing a basis of \(\uparrow \!\mathrm {post}^*(s)\) and checking whether the intersection with the anti-ideal is empty (Lemma 3). One the other hand, we can compute a basis of \(\uparrow \!\mathrm {post}^*(s)\) by computing the sequence of ideals \(P_k = \uparrow \!\mathrm {post}^{\le k} (s) \) until it becomes stationary (Lemma 1). The stop condition, i.e., the condition which guarantees that we can terminate the algorithm, is formalized as anti-ideal reachability.    \(\Box \)

The characterization in Proposition 1 is used to show that Petri nets are post\(^*\)-effective. It is well-known that Petri nets constitute SWSTSs [9, Thm. 6.1].

Example 2 (variations of Petri nets)

(1) Petri nets (equipped with any finite set of initial states) are \(\mathrm {post}^*\)-effective by Proposition 1: Reachability for Petri nets is decidable and recursively equivalent to submarking reachability [8, p.6]. This corresponds to the anti-ideal reachability problem for Petri nets.

(2) Lossy Petri nets are Petri nets where in any state, one token may get lost at any place. Lossy Petri nets are lossy for every set of initial states.

(3) Reset-lossy (mixed-lossy) Petri nets are reset Petri nets [5] where in any state, all tokens (or one token) may get lost at any place. Reset-lossy (mixed-lossy) Petri nets are \(\bot \)-bounded (and lossy for every set of initial states).

For some results, we assume that a basis of the set of all states is given. This is only relevant if we use these basis elements for computations.

Notation

For a WSTS \(\langle S,\le ,\rightarrow \rangle \) with a given basis of \(S\), we write WSTS\(^{B}\).

Fig. 4.
figure 4

Subclasses of fin-marked WSTS\(^B\)s.

The next proposition shows how the requirements are related provided that a basis of the set of all states is given. The Venn diagram in Fig. 4 illustrates the relations of the subclasses corresponding to the requirements.

Proposition 2

Lossy (\(\bot \)-bounded) fin-marked WSTS\(^{B}\)s are post\(^*\)-effective.

Proof (sketch)

Let \(\langle S,\le ,\rightarrow ,\mathrm {INIT}\rangle \) be a lossy (\(\bot \)-bounded) fin-marked WSTS\(^{B}\). To compute a basis of \(\uparrow \!\mathrm {post}^*(\mathrm {INIT})\) for a finite set \(\mathrm {INIT}\), we look at the reachable elements of a basis of the set \(S\) of all states. Such a basis element is reachable iff its upward-closure is reachable. By Lemma 2, the latter is decidable.    \(\Box \)

Our main result for fin-marked SWSTSs terms sufficient criteria under which the resilience problems are decidable.

Theorem 1 (decidability for fin-marked SWSTSs)

Both resilience problems are decidable for fin-marked SWSTSs which are

  1. (1)

    post\(^*\)-effective if \(\mathrm {BAD}\in \mathcal {J}\), \(\mathrm {SAFE}\in \mathcal {I}\) (corresp. [14, Thm. 1]),

  2. (2)

    lossy if \(\mathrm {BAD},\mathrm {SAFE}\in \mathcal {I}\).

The bounded resilience problem is decidable for fin-marked SWSTS\(^{B}\)s which are

  1. (3)

    lossy and \(\bot \)-bounded if \(\mathrm {BAD}\in \mathcal {I}\), \(\mathrm {SAFE}\in \mathcal {J}\),

  2. (4)

    \(\bot \)-bounded if \(\mathrm {BAD},\mathrm {SAFE}\in \mathcal {J}\).

Key Idea of the Proof. We compute a finite representation of \( \mathrm {post}^*(\mathrm {INIT}) \cap \mathrm {BAD}\) for checking inclusion in a decidable ideal \( I \) which is a predecessor set of \(\mathrm {SAFE}\).

The proof structure is shown in Fig. 5: Lemma 4 states that for \(\mathrm {post}^*\)-effective (lossy) fin-marked SWSTSs, a finite representation of \(\mathrm {post}^*(\mathrm {INIT})\cap \mathrm {BAD}\) is computable, i.e., inclusion in a decidable ideal is decidable. In the case \(\mathrm {SAFE}\in \mathcal {I}\), the set \(\mathrm {pre}^{\le k}(\mathrm {SAFE})\) is a decidable ideal for every \(k\ge 0\). (Lemma 5 shows the existence of bounds for the set of all predecessors of \(\mathrm {SAFE}\in \mathcal {J}\) provided that the SWSTS is \(\bot \)-bounded.) Proposition 3 shows that \(\mathrm {pre}^*(\mathrm {SAFE})\) constitutes a decidable ideal in the case \(\mathrm {SAFE}\in \mathcal {J}\) if the SWSTS\(^{B}\) is \(\bot \)-bounded.

Fig. 5.
figure 5

Structure of the decidability proof for fin-marked SWSTSs.

The following lemma states that the inclusion of \(\mathrm {post}^*(\mathrm {INIT}) \cap \mathrm {BAD}\) in an decidable ideal is decidable if we consider \(\mathrm {post}^*\)-effective in the case \(\mathrm {BAD}\in \mathcal {J}\) or lossy fin-marked WSTSs in the case \(\mathrm {BAD}\in \mathcal {I}\).

Lemma 4 (checking inclusion)

Let \(\langle S,\le ,\rightarrow ,\mathrm {INIT}\rangle \) be a fin-marked WSTS, \(\mathrm {BAD}\subseteq S\), and \( I \subseteq S\) be a decidable ideal. Then, it is decidable whether \(\mathrm {post}^*(\mathrm {INIT}) \cap \mathrm {BAD}\subseteq I \) provided that the fin-marked WSTS is (a) \(\mathrm {post}^*\)-effective and \(\mathrm {BAD}\in \mathcal {J}\), (b) lossy and \(\mathrm {BAD}\in \mathcal {I}\).

Proof (sketch)

We compute a finite representation of \(\mathrm {post}^*(\mathrm {INIT}) \cap \mathrm {BAD}\) for checking inclusion in the decidable ideal \( I \). To this aim, we use Lemma 3. In case (a), the finite representation is \(B_\mathrm {post}\cap \mathrm {BAD}\) where \(B_\mathrm {post}\) is a basis of \(\uparrow \!\mathrm {post}^*(\mathrm {INIT})\). In case (b), the finite representation is \(\downarrow \!\mathrm {post}^*(\mathrm {INIT}) \cap B_\mathrm {BAD}\) where \(B_\mathrm {BAD}\) is a basis of \(\mathrm {BAD}\).    \(\Box \)

By the next lemma, \(\bot \)-boundedness implies that for any anti-ideal \( J \), \(\mathrm {pre}^*( J )\) is an ideal and \(\mathrm {pre}^*( J )= \mathrm {pre}^{\le k}( J )\) for a \(k\ge 0\).

Lemma 5 (existence of bounds)

For every \(\bot \)-bounded SWSTS and every anti-ideal \( J \), there exists a \(k \ge 0\) s.t. \(\mathrm {pre}^*( J )=\uparrow \!\mathrm {pre}^*( J )=\mathrm {pre}^{\le k}( J )\).

Proof (sketch)

By Lemma 1, for every set A of states, there exists a \(k_0\ge 0\) s.t. \(\uparrow \!\mathrm {pre}^*(A) =\uparrow \!\mathrm {pre}^{\le k_0}(A)\). By strong compatibility and \(\bot \)-boundedness, there exists a constant \(\ell \ge 0\) s.t. \(\uparrow \!\mathrm {pre}^{\le k }( J ) \subseteq \mathrm {pre}^{\le k + \ell }( J )\) for every anti-ideal \( J \). Hence, \(\mathrm {pre}^*( J ) \subseteq \uparrow \!\mathrm {pre}^*( J )=\uparrow \!\mathrm {pre}^{\le k_0}( J )\subseteq \mathrm {pre}^{\le k_0 + \ell }( J ) \subseteq \mathrm {pre}^*( J ). \)    \(\Box \)

The following proposition identifies sufficient prerequisites s.t. \(\mathrm {pre}^{*}(\mathrm {SAFE}) \) constitutes a decidable ideal in the case \(\mathrm {SAFE}\in \mathcal {J}\).

Proposition 3 (decidable ideals)

For every \(\bot \)-bounded SWSTS\(^B\) and every decidable anti-ideal \( J \), the set \(\mathrm {pre}^{*}( J ) \) is a decidable ideal.

Proof (sketch)

By Lemma 5, \(\uparrow \!\mathrm {pre}^{*}( J )=\mathrm {pre}^{*}( J )\). Thus, it is an ideal. By Lemma 3, \(s \not \in \mathrm {pre}^{*}( J )\) \(\Longleftrightarrow \) \(B_\mathrm {post}(s) \cap J = \varnothing \) where \(B_\mathrm {post}(s)\) is a basis of \(\uparrow \!\mathrm {post}^*(s)\). By Proposition 2, \(\bot \)-boundedness implies \(\mathrm {post}^*\)-effectiveness w.r.t. any finite set of initial states, provided that a basis of \(S\) is given. Hence, membership is decidable.    \(\Box \)

We compile our preparatory results to prove Theorem 1.

Proof

(of Theorem 1). Cases (1) & (2). By Fact 4, \(\mathrm {pre}^{\le k}(\mathrm {SAFE})\) is an ideal for every \(k\ge 0\) since \(\mathrm {SAFE}\in \mathcal {I}\). For every \(k\ge 0\), \(\mathrm {pre}^{\le k+1}(\mathrm {SAFE})=\mathrm {pre}(\mathrm {pre}^{\le k}(\mathrm {SAFE}))\cup \mathrm {SAFE}\). By Definition 8 and Fact 3, a basis of \(\mathrm {pre}^{\le k}(\mathrm {SAFE})\) is iteratively computable. By Lemma 4, we can decide whether \(\mathrm {post}^*(\mathrm {INIT})\cap \mathrm {BAD}\subseteq \mathrm {pre}^{\le k}(\mathrm {SAFE})\) for (1) post\(^*\)-effective fin-marked SWSTSs and (2) lossy fin-marked SWSTSs, respectively. By Lemma 1, the infinite ascending sequence \(\mathrm {SAFE}\subseteq \mathrm {pre}^{\le 1}(\mathrm {SAFE})\subseteq \mathrm {pre}^{\le 2}(\mathrm {SAFE})\subseteq \ldots \) becomes stationary, i.e., there is a minimal \(k_0 \ge 0\) s.t. \(\mathrm {pre}^{\le k_0}(\mathrm {SAFE})=\mathrm {pre}^*(\mathrm {SAFE})\). By Lemma 2, we can also determine this \(k_0\). Thus, we can determine the minimal number \(k=k_\mathrm {min}\) s.t. \(\mathrm {post}^*(\mathrm {INIT})\cap \mathrm {BAD}\subseteq \mathrm {pre}^{\le k}(\mathrm {SAFE})\) (if it exists) and also whether it exists. Hence, we can decide the bounded resilience problem and given any k, we can check whether \(k_\mathrm {min}\le k\) to decide the explicit resilience problem.

Cases (3) & (4). By Lemma 5, for \(\bot \)-bounded SWSTSs, there exists a \(k\ge 0\) s.t. \(\mathrm {pre}^{*}(\mathrm {SAFE})=\mathrm {pre}^{\le k}(\mathrm {SAFE})\). Hence, checking bounded resilience is equivalent to testing inclusion in \(\mathrm {pre}^{*}(\mathrm {SAFE})\). By Proposition 3, for \(\bot \)-bounded SWSTS\(^{B}\)s, \(\mathrm {pre}^{*}(\mathrm {SAFE})\) is a decidable ideal since \(\mathrm {SAFE}\in \mathcal {J}\). By Lemma 4, we obtain that checking \(\mathrm {post}^*(\mathrm {INIT})\cap \mathrm {BAD}\subseteq \mathrm {pre}^{*}(\mathrm {SAFE})\) is decidable for (3) lossy, \(\bot \)-bounded fin-marked SWSTS\(^{B}\)s and (4) \(\mathrm {post}^*\)-effective, \(\bot \)-bounded fin-marked SWSTS\(^{B}\)s, respectively. By Proposition 2, \(\bot \)-boundedness implies \(\mathrm {post}^*\)-effectiveness provided that a basis of the set of all states is given.    \(\Box \)

4 Application to Graph Transformation Systems

We translate the results for WSTSs into the GTS setting.

The sets of positive and negative constraints are subsumed as ideal-based constraints.

Definition 12 (ideal-based constraints)

We denote the set of positive (negative) constraints by \(\mathcal {I}_\text {c}\) (\(\mathcal {J}_\text {c}\)). An ideal-based constraint is an element of \(\mathcal {I}_\text {c}\cup \mathcal {J}_\text {c}\).

Recall that we consider the subgraph order as wqo. Path-length-boundedness on the graph class guarantees that the subgraph order yields a wqo.

Similarly to marked WSTSs, a marked GTS is a GTS together with a graph class closed under rule application and a subset \(\mathrm {INIT}\) of graphs.

Definition 13 (marked GTS)

A marked GTS is a tuple \(\langle S,\mathcal {R},\mathrm {INIT}\rangle \) where \(S\) is a (possibly infinite) set of graphs, \(\mathcal {R}\) is a GTS with \(\Rightarrow _\mathcal {R}\subseteq S\times S\), and \(\mathrm {INIT}\subseteq S\). We speak of a marked GTS of bounded path length, shortly \(\text {GTS}^\text {bp}\), if \(S\) is of bounded path length and there exist \( I \in \mathcal {I}\), \( J \in \mathcal {J}\) (in the class of all graphs) s.t. \(S= I \cap J \).

Remark

Ususally, one considers S as a decidable anti-ideal, as, e.g., in [12]. Then, the basis of \(S\) is given by the empty graph. By allowing \(S= I \cap J \), we can consider more arbitrary bases of graphs. This is relevant for lossiness and \(\bot \)-boundedness. A basis of \(S\) is given by \(B_ I \cap J \) where \(B_ I \) is basis of \( I \).

Example 3 (starry sky)

The rules together with the set of disjoint unions of unboundedly many star-shaped graphs (including isolated nodes) and any subset form a marked \(\text {GTS}^\text {bp}\).

We formulate the resilience problems for marked GTSs.

figure f
figure g

In the resilience problems for WSTSs, we considered ideal-based sets. We show that one can input ideal-based constraints instead.

Lemma 6 (ideal-based graph sets)

Let \(S= I \cap J \) be a graph class where \( I \in \mathcal {I}\) and \( J \in \mathcal {J}\). For every positive (negative) constraint c, \([\![c\; \!]\!]\in \mathcal {I}\) (\(\mathcal {J}\)).

Proof

By Fact 2, for every positive (negative) constraint c, the set \([\![c\; \!]\!]\) is an (anti-)ideal. Satisfaction (\(\models \)) of negative constraints is decidable. Let c be a positive constraint and \(b=\bigvee _{G \in B} \exists G\) where B is a given basis of \( I \). Then, \(b \wedge c\) is a positive constraint. By Fact 1, we can compute a positive constraint \(c'\) s.t. \([\![c'\; \!]\!]=\![\![b \wedge c\; \!]\!]\) (in the class of all graphs) and \(c'\) is of the form \(\bigvee _{1\le i \le n} \exists G_i\) where \( G_i \not \le G_j \) for \(i \ne j\). Since \( J \in \mathcal {J}\), we can compute the set \(\{ G_i \in J : 1\le i \le n\}\) which is a basis of \([\![c\; \!]\!]_S=\{ G \in S: G \models c\}\). Hence, we can assume that a basis of \([\![c\; \!]\!]_S\) is given.    \(\Box \)

Remark

More general constraints [10, 16] do not constitute (anti-)ideals w.r.t. the subgraph order, in general. Consider, e.g., the “nested” constraint expressing that every node has a loop. The graph consisting of one node and one loop satisfies the latter constraint. However, the bigger graph consisting of two nodes and one loop does not satisfy it. (The smaller graph consisting of a single node does not satisfy it either.) Thus, \([\![\text {AllLoop}\; \!]\!]\) is not an (anti-)ideal. Regarding the induced subgraph order [12], some “nested” constraints constitute ideals: The constraint \(\exists (G, \bigwedge _{G^+ \in \text {Ext}(G)} \lnot \exists (G \hookrightarrow G^+ ))\) expresses that the graph G is an induced subgraph of the considered graph. Here \(\text {Ext}(G)\) is the set of all graphs \(G^+\) obtained from G by adding one edge.

The following result of König & Stückrath terms a sufficient criterion for GTSs to be well-structured.

Lemma 7

(well-structured GTS [12, Prop. 7]). Every marked \(\text {GTS}^\text {bp}\)induces a marked SWSTS\(^{B}\) (equipped with the subgraph order).

In particular, they give an effective procedure for obtaining a basis of \(\mathrm {pre}(\uparrow \!\{G\})\) for every given graph G. Note that in [12], König & Stückrath consider labeled hypergraphs. However, the proof in our case is the same.

Convention

When speaking of a (fin-)marked \(\text {GTS}^\text {bp}\), we consider the induced (fin-)marked SWSTS\(^{B}\). We also adopt the terminology for “post\(^*\)-effective”, “lossy”, and “\(\bot \)-bounded”.

We apply our results from Sect. 3 to fin-marked \(\text {GTS}^\text {bp}\).

Theorem 2 (decidability for fin-marked GTSs)

Both resilience problems are decidable for fin-marked \(\text {GTS}^\text {bp}\)s which are

  1. (1)

    post\(^*\)-effective if \(\mathrm {Bad}\in \mathcal {J}_\text {c}\), \(\mathrm {Safe}\in \mathcal {I}_\text {c}\),

  2. (2)

    lossy if \(\mathrm {Bad},\mathrm {Safe}\in \mathcal {I}_\text {c}\).

The bounded resilience problem is decidable for fin-marked \(\text {GTS}^\text {bp}\)s which are

  1. (3)

    lossy and \(\bot \)-bounded if \(\mathrm {Bad}\in \mathcal {I}_\text {c}\), \(\mathrm {Safe}\in \mathcal {J}_\text {c}\),

  2. (4)

    \(\bot \)-bounded if \(\mathrm {Bad},\mathrm {Safe}\in \mathcal {J}_\text {c}\).

Proof

By Lemma 7 [12], every fin-marked \(\text {GTS}^\text {bp}\) induces a fin-marked SWSTS\(^B\). Thus, the statements of Theorem 1 apply to \(\text {GTS}^\text {bp}\)s with the respective requirements. By Lemma 6, one can input ideal-based constraints instead of ideal-based sets.    \(\Box \)

We illustrate our decidability results by an example.

Example: Circular Process Protocol

In Fig. 6, the formalization as GTS of the circular process protocol in Sect. 1 is shown. Note that each Clear-rule is undefined on the node which has a \(c_i\)-labeled loop. In a rule application, this node will be deleted and recreated. Note also that each Leave-rule identifies two nodes.

Fig. 6.
figure 6

Rules of the circular process protocol.

We consider all graphs with arbitrarily many commands of any kind (labeled with \(c_0,c_1\), or \(c_2\)) in any collection, fitting to one of the topologies shown in Fig. 1. This graph class is of bounded path length. A basis of this graph class is given by the topologies without any commands as in Fig. 1. The marked \(\text {GTS}^\text {bp}\) is lossy since the rules for loosing a command \(c_i\) may be applied to any graph containing a command \(c_i\). It is \(\bot \)-bounded since we can reach a graph with the same topology but containing no commands by (i) initiating a command \(c_0\), (ii) forwarding it to the collection of \(P_0\), (iii) clearing all collections one after another, and (iv) loosing the only remaining command. By Proposition 2, it is \(\mathrm {post}^*\)-effective.

The example constraints for \(\mathrm {BAD}\) and \(\mathrm {SAFE}\) in Sect. 1 can be expressed as positive/negative constraints:

It can be verified that the given k’s in the following table are minimal.

figure h

By clearing the collection of \(P_i\), it is not enabled. Thus, for the third instance, \(k_\mathrm {min}=1\) since \(k_\mathrm {min}\ne 0\). Using the algorithms presented in Sect. 3, we can compute \(k_\mathrm {min}\) for the remaining cases.Footnote 1

5 Rule-Specific Criteria

We identify sufficient and handy GTS criteria for the requirements in Theorem 2. These criteria comprise properties of the rules.

Definition 14 (rule properties)

A rule \(\langle L\overset{p}{\rightharpoonup }R\rangle \) is node-bijecitve if p is bijective on the nodes. It is preserving if p is total and injective. A GTS is node-bijective (preserving) if all its rules are node-bijective (preserving).

For lossiness and \(\bot \)-boundedness, we consider sets of rules contained in a GTS in order to reach smaller graphs (but not smaller than basis elements).

Assumption

Let \(S\) be a graph class over \(\varLambda \) and B a basis of \(S\).

Each lossy rule deletes one item (node or edge/loop) outside of a basis element.Footnote 2 Therefore they are constructed s.t. in each rule, a basis element is present.

Construction 1 (lossy rules)

The set \(\mathcal {R}_\text {loss}(S)\) of lossy rules w.r.t. \(S\) are constructed as follows.

  1. (1)

    For graphs \(G \in B\), \(H \in \mathcal {H}_\varLambda \), the set \(\mathcal {C}(G,H)\) is defined as all graphs C s.t. \( \exists \langle G \hookrightarrow C, H \hookrightarrow C\rangle \) jointly surjective, and

    figure i
  2. (2)

    For every graph \(C \in \mathcal {C}(G,H)\cap S\), every rule \(\langle C \overset{p}{\rightharpoonup }p(C)\rangle \) where p is undefined on exactly one item (node or edge) which is not in (the image of) G and the identity otherwise, is a lossy rule.

A similar idea works for \(\bot \)-boundedness. Each bottom rule either deletes a node outside of a basis element, or deletes and recreates a node (with its incident edges) of a basis element.

Construction 2 (bottom rules)

The set \(\mathcal {R}_{\bot }(S)\) of bottom rules w.r.t. \(S\) are constructed as follows. For every basis element \(G\in B\) and

  1. (1)

    for every label \(x \in \varLambda _V\) s.t. , the rule where p is undefined on the node and the identity otherwise, is a bottom rule,Footnote 3

  2. (2)

    for every node \(v \in V_G\), the rule \(\langle G \overset{p}{\rightharpoonup }G\rangle \) where p is undefined on v and its incident edges, and the identity otherwise, is a bottom rule.

For \(\bot \)-boundedness, we additionally restrict the graph class. A graph class is node-bounded if the number of nodes in any graph of the class is bounded.

The following result shows that the rule-specific criteria are sufficient.

Theorem 3 (criteria)

A marked \(\text {GTS}^\text {bp}\) \(\langle S,\mathcal {R},\mathrm {INIT}\rangle \) is

  1. (1)

    post\(^*\)-effective if (\(\mathrm {INIT}\) is finite and) \(\mathcal {R}\) is node-bijective or preserving,

  2. (2)

    lossy if \(\mathcal {R}_\text {loss}(S) \subseteq \mathcal {R}\),

  3. (3)

    \(\bot \)-bounded if \(S\) is node-bounded and \(\mathcal {R}_{\bot }(S) \subseteq \mathcal {R}\).

Proof (sketch)

(1) If \(\mathcal {R}\) is preserving, the statement follows by Fact 3 since \(\uparrow \!\mathrm {post}^*(\mathrm {INIT})=\uparrow \!\mathrm {INIT}\). If \(\mathcal {R}\) is node-bijective, the statement follows by the reduction in the proof of [3, Prop. 10]. For any graph G, a Petri net with initial marking is constructed s.t. reachability and the wqo correspond to \(G\Rightarrow ^*_\mathcal {R}\) and the subgraph order, respectively. Petri nets are post\(^*\)-effective, see Example 2.

(2) Using the lossy rules, we can delete any item in \(G\setminus i(G_B )\) for every \(G \in S\) and \(G\ge G_B \in B\) where B is a basis of \(S\) and \(i: G_B \hookrightarrow G\). Hence, a sequence of node and edge deletions from G to any smaller graph \(G'\in S\) is also feasible via the lossy rules.

(3) Since \(S\) is node-bounded, we can delete all nodes in \(G\setminus i( G_B )\) in a bounded number of steps for every \(G \in S\) and \(G\ge G_B \in B\) where B is a basis of \(S\) and \(i: G_B \hookrightarrow G\). Then, by applying the rules for deleting and recreating, we can reach any smaller basis element in \(\le \max _{G_B \in B} \vert V_{G_B} \vert \) steps.    \(\Box \)

Remark

A lossy/bottom rule intended for node deletion will delete dangling edges outside of (the image of) a basis element. A bottom rule of the “second type” is intended to delete dangling edges and restore items of the basis element.

Example 4 (criteria)

(1) The GTS in Fig. 6 (circular process protocol) without the Clear- and Leave-rules is node-bijective. (2) The Loose-rules in Fig. 6 can be adapted (see Fig. 7) s.t. they fit in our definition of lossy rules, taking into account the three basis elements in Fig. 1.

Fig. 7.
figure 7

The lossy rules of the circular process protocol.

(3) We adapt Example 3 (starry sky) s.t. the criterion for \(\bot \)-boundedness is fulfilled. Let \(D_n\) be the disjoint union of n A-labeled nodes and \(D_1^\text {loop}\) an A-labeled node with a single loop. We restrict the graph class to all graphs with exactly n A-labeled nodes and unboundedly many loops. The single basis element is the graph \(D_n\). Consider the rule \(\langle D_1 \hookrightarrow D_1^\text {loop}\rangle \) and the bottom rule \(\langle D_n \overset{p}{\rightharpoonup }D_n\rangle \), i.e., deleting and recreating one node in \(D_n\).

6 Related Concepts

The concept of resilience [11, 17] is broadly used with varying definitions.

For modeling systems, we use SPO graph transformation as in [7].

Abdulla et al. [1] show the decidability of ideal reachability (coverability), eventuality properties and simulation in (labeled) SWSTSs. We use the presented algorithm as an essential integrant of our decidability proof.

Finkel and Schnoebelen [9] show that the concept of well-structuredness is ubiquitous in computer science by providing a large class of example models. They give several decidability results for well-structured systems with varying notions of compatibility, also generalizing the algorithm of [1] to WSTSs.

König and Stückrath [12] extensively study the well-structuredness of GTSs regarding three types of wqos (minor, subgraph, induced subgraph). All GTSs are strongly well-structured on graphs of bounded path length w.r.t. the subgraph order. This result enables us to apply our abstract results to GTSs. They regard Q-restricted WSTSs whose state sets have not to be a wqo but rather a subset Q of the states is a wqo. König & Stückrath develop a backwards algorithm based on [9] for Q-restricted WSTSs (GTSs).

Bertrand et al. [3] study the decidability of reachability and coverability for GTSs using, in parts, well-structuredness. A variety of rule-specific restrictions is investigated, e.g., containedness of node/edge-deletion rules. We use one of their results to obtain a sufficient criterion for post\(^*\)-effectiveness. In contrast to [3], we stay in the framework of well-structured GTSs.

In Fig. 8, the main results of this paper (bold boxes) are placed in the context of known results. The arrows mean “used for”, the hooked arrows mean “instance of” or “generalized to”. Our result for SWSTSs uses the well-known coverability algorithm [1, 9] for (S)WSTSs which exploits the Noetherian property (a general concept for algebraic structures). For \(\bot \)-bounded SWSTSs, we also employ the Noetherian property. On the level of GTSs, we use the predecessor-basis procedure of [12]. To the best of the author’s knowledge, the considered notion of resilience was first studied in [14]. We extended the latter to a systematic investigation. The result for SWSTSs in [14] (Thm. 1) corresponds to case (1) of our Theorem 1. The result for GTSs in [14] (Thm. 2) is slightly less general than case (1) of our Theorem 2. For case (1) of Theorem 3, we use a result in [3] and well-known results for Petri nets [8].

Fig. 8.
figure 8

Our results in the context of the theory of WSTSs and (ideal) reachability.

7 Conclusion

We provided a systematic investigation on resilience problems obtaining decidability results for subclasses of marked GTSs by using the concept of well-structuredness. The used well-quasi-order on graphs is the subgraph order, i.e., a prerequisite is the path-length-boundedness on the graph class. The requirements for decidability are post\(^*\)-effectiveness or a kind of unreliability (lossy, \(\bot \)-bounded). We identified sufficient rule-specific criteria for these requirements.

For future work, we will consider (1) possibilities of a modified approach for typed graphs [6], (2) other proof methods to handle nested constraints [10], and (3) other well-quasi-orders on graphs, e.g., the induced subgraph order [12].