Towards an integrated formal analysis for security and trust

被引:0
|
作者
Martinelli, F [1 ]
机构
[1] CNR, Ist Informat & Telemat, I-56100 Pisa, Italy
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We aim at defining an integrated framework for the specification and (automated) analysis for security and trust in complex and dynamic scenarios. In particular, we show how the same machinery used for the formal verification of security protocols may be used to analyze access control policies based on trust management.
引用
收藏
页码:115 / 130
页数:16
相关论文
共 50 条
  • [1] A Formal Model for Security Analysis of Trust and Reputation systems
    Ghasempouri, Seyed Asgary
    Ladani, Behrouz Tork
    [J]. 2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 13 - 18
  • [2] Formal analysis and verification of security for automated trust negotiation
    Liu, Xin-Xin
    Tang, Shao-Hua
    [J]. Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2013, 41 (01): : 77 - 82
  • [3] A formal approach to the integrated analysis of security and QoS
    Aldini, Alessandro
    Bernardo, Marco
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2007, 92 (11) : 1503 - 1520
  • [4] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    [J]. IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [5] Towards Formal Security Analysis of Industrial Control Systems
    Rocchetto, Marco
    Tippenhauer, Nils Ole
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 114 - 126
  • [6] Towards a formal framework for computational trust
    Sassone, Vladimiro
    Krukow, Karl
    Nielsen, Mogens
    [J]. FORMAL METHODS FOR COMPONENTS AND OBJECTS, 2007, 4709 : 175 - +
  • [7] Integrated security analysis framework for an enterprise network - a formal approach
    Bera, P.
    Ghosh, S. K.
    Dasgupta, P.
    [J]. IET INFORMATION SECURITY, 2010, 4 (04) : 283 - 300
  • [8] Towards Formal Security Analysis of GTRBAC using Timed Automata
    Mondal, Samrat
    Sural, Shamik
    Atluri, Vijayalakshmi
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 33 - 42
  • [9] Towards formal analysis of wireless LAN security with MIS protocol
    You, Ilsun
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 7 (02) : 112 - 120
  • [10] BioSec: Biometrics and security towards trust and security
    Sanchez, O
    [J]. EADOPTION AND THE KNOWLEDGE ECONOMY: ISSUES, APPLICATIONS, CASE STUDIES, PTS 1 AND 2, 2004, 1 : 203 - 210