Verification method of security model based on UML and model checking

被引:0
|
作者
Cheng, Liang [1 ,2 ]
Zhang, Yang [2 ]
机构
[1] Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei 230027, China
[2] Stale Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
来源
关键词
Formal verification - Unified Modeling Language;
D O I
10.3724/SP.J.1016.2009.00699
中图分类号
学科分类号
摘要
As the development of security operating system, the formal analysis and verification of the security models has been one of the hottest topics now. A new method to verify the correctness of security models is proposed in this paper based on the study of predecessors' work, which made use of the Unified Modeling Language (UML) and model checking. This approach first used the UML to specify the security model in the form of finite state machine diagrams and the class diagrams, and then translated these UML diagrams to the input language of model checkers. And it used the model checker to verify the model's correctness or the violation of security properties for the last step. The authors demonstrate the violation of confidentiality of the DBLP and SLCF model by the new approach.
引用
收藏
页码:699 / 708
相关论文
共 50 条
  • [31] Checking security properties by model checking
    De Francesco, N
    Lettieri, G
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2003, 13 (03): : 181 - 196
  • [32] Synthesis of attack actions using model checking for the verification of security protocols
    Basagiannis, Stylianos
    Katsaros, Panagiotis
    Pombortsis, Andrew
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 147 - 161
  • [33] Model checking: Verification or debugging?
    Ruys, TC
    Brinksma, E
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 3009 - 3015
  • [34] Design verification by model checking
    1600, Japan Society for Software Science and Technology (31):
  • [35] MODEL CHECKING AND MODULAR VERIFICATION
    GRUMBERG, O
    LONG, DE
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (03): : 843 - 871
  • [36] Bytecode verification by model checking
    ETH Zürich, Zürich, Switzerland
    不详
    不详
    Basin, D., 1600, Kluwer Academic Publishers (30): : 3 - 4
  • [37] Bytecode Verification by Model Checking
    David Basin
    Stefan Friedrich
    Marek Gawkowski
    Journal of Automated Reasoning, 2003, 30 : 399 - 444
  • [38] MODEL CHECKING AND MODULAR VERIFICATION
    GRUMBERG, O
    LONG, DE
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 527 : 250 - 265
  • [39] Bytecode verification by model checking
    Basin, D
    Friedrich, S
    Gawkowski, M
    JOURNAL OF AUTOMATED REASONING, 2003, 30 (3-4) : 399 - 444
  • [40] Guiding Simulation Model Verification by Model Checking
    Xia, Wei
    Yao, Yiping
    Mu, Xiaodong
    Xing, Fei
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 : 3508 - +