Using Refinement in Formal Development of OS Security Model

被引:1
|
作者
Devyanin, Petr N. [1 ]
Khoroshilov, Alexey V. [2 ]
Kuliamin, Victor V. [2 ]
Petrenko, Alexander K. [2 ]
Shchepetkov, Ilya V. [2 ]
机构
[1] Educ & Method Community Informat Secur, Moscow, Russia
[2] Russian Acad Sci, Inst Syst Programming, Moscow, Russia
关键词
Security model; Formal verification; Refinement; Event-B;
D O I
10.1007/978-3-319-41579-6_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The paper presents work in progress on formal development of an operating system security model for the purpose of its deductive verification. We consider two approaches to formalize the security model. The first one is to build a monolithic model, another one is to build a hierarchical model using the refinement technique. The main criteria for comparison are costs of development, simplicity of maintenance and confidence in the quality of the formal model. The results are twofold. On the one hand, refinement helped us to deal with complexity of the formal model, to improve its readability and to simplify automatic proofs. However, deep understanding of the security model details and careful planning were absolutely necessary to build a reasonable hierarchical model. The monolithic approach allowed to quickly start formalization and helped to study the details of the security model, but the resulting formal model became hard to maintain and explore.
引用
收藏
页码:107 / 115
页数:9
相关论文
共 50 条
  • [1] Formal Verification of OS Security Model with Alloy and Event-B
    Devyanin, Petr N.
    Khoroshilov, Alexey V.
    Kuliamin, Victor V.
    Petrenko, Alexander K.
    Shchepetkov, Ilya V.
    [J]. ABSTRACT STATE MACHINES, ALLOY, B, TLA, VDM, AND Z, ABZ 2014, 2014, 8477 : 309 - 313
  • [2] A formal software development approach using refinement calculus
    Wang, YF
    Pang, J
    Zha, M
    Yang, ZH
    Zheng, GL
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2001, 16 (03): : 251 - 262
  • [3] A formal software development approach using refinement calculus
    Yunfeng Wang
    Jun Pang
    Ming Zha
    Zhaohui Yang
    Guoliang Zheng
    [J]. Journal of Computer Science and Technology, 2001, 16 : 251 - 262
  • [4] A Formal Software Development Approach Using Refinement Calculus
    王云峰
    庞军
    查鸣
    杨朝晖
    郑国梁
    [J]. Journal of Computer Science & Technology, 2001, (03) : 251 - 262
  • [5] Development of A Formal Security Model for Electronic Voting Systems
    Braeunlich, Katharina
    Grimm, Ruediger
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (02) : 1 - 28
  • [6] A formal approach to model refactoring and model refinement
    Van Der Straeten, Ragnhild
    Jonckers, Viviane
    Mens, Tom
    [J]. SOFTWARE AND SYSTEMS MODELING, 2007, 6 (02): : 139 - 162
  • [7] A formal approach to model refactoring and model refinement
    Ragnhild Van Der Straeten
    Viviane Jonckers
    Tom Mens
    [J]. Software & Systems Modeling, 2007, 6 : 139 - 162
  • [8] Formal verification of security model using SPR tool
    Kim, Il-Gon
    Kang, Miyoung
    Choi, Jin-Young
    Zegzhda, Peter D.
    Kalinin, Maxim O.
    Zegzhda, Dmitry P.
    Kang, Inhye
    [J]. COMPUTING AND INFORMATICS, 2006, 25 (05) : 353 - 368
  • [9] Implementation of a formal security policy refinement process in WBEM architecture
    Laborde, Romain
    Kamel, Michel
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (02) : 241 - 266
  • [10] Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
    Romain Laborde
    Michel Kamel
    François Barrère
    Abdelmalek Benzekri
    [J]. Journal of Network and Systems Management, 2007, 15 : 241 - 266