Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets

被引:20
|
作者
Huang, Hejiao [1 ]
Kirchner, Helene [2 ]
机构
[1] Shenzhen Univ Town, Harbin Inst Technol, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[2] INRIA Bordeaux Sud Ouest, Ctr Rech, F-33405 Talence, France
基金
中国国家自然科学基金;
关键词
Security policy; colored Petri net; specification and verification; property preservation;
D O I
10.1109/TDSC.2010.43
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security policies are one of the most fundamental elements of computer security. Current security policy design is concerned with the composition of components in security systems and interactions among them. Consequently, in a modular specification and verification of a policy, the composition of the modules must consistently assure security policies. A rigorous and systematic way to predict and assure such critical properties is crucial. This paper addresses the problem in a formal way. It uses colored Petri net process (CPNP) to specify and verify security policies in a modular way. It defines fundamental policy properties, i.e., completeness, termination, consistency, and confluence in Petri net terminology and gets some theoretical results. According to the eXtensible Access Control Markup Language (XACML) combiners and property preserving Petri net process algebra ( PPPA), several policy composition operators are specified and property preserving results are stated for the policy correctness verification. As an application, the approach is illustrated for the design of Chinese Wall Policy.
引用
收藏
页码:852 / 865
页数:14
相关论文
共 50 条
  • [1] A model-based approach to formal specification and verification of embedded systems using colored Petri nets
    da Silva, LD
    Perkusich, A
    [J]. COMPONENT-BASED SOFTWARE DEVELOPMENT FOR EMBEDDED SYSTEMS: AN OVERVIEW OF CURRENT RESEARCH TRENDS, 2005, 3778 : 35 - 58
  • [2] Component-Based Security Policy Design with Colored Petri Nets
    Huang, Hejiao
    Kirchner, Helene
    [J]. SEMANTICS AND ALGEBRAIC SPECIFICATION: ESSAYS DEDICATED TO PETER D. MOSSES ON THE OCCASION OF HIS 60TH BIRTHDAY, 2009, 5700 : 21 - +
  • [3] On Verification of Implementation of Security Specification with Petri Nets' Protocol Inheritance
    Tang, Wenshan
    Gou, Zhaolong
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [4] VERIFICATION OF ERROR RECOVERY SPECIFICATION FOR DISTRIBUTED DATA BY USING COLORED PETRI NETS
    AKATSU, M
    MURATA, T
    KURIHARA, K
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS ELECTRONICS INFORMATION AND SYSTEMS, 1991, 74 (10): : 3159 - 3167
  • [5] MATRIX SPECIFICATION AND ANALYSIS OF COLORED PETRI NETS
    BELIKOV, VK
    RUTNER, YF
    [J]. SOVIET JOURNAL OF COMPUTER AND SYSTEMS SCIENCES, 1988, 26 (03): : 77 - 80
  • [6] Considering Time in Formal Analysis of Security Protocols Using Colored Petri Nets
    Xu, Meng
    Su, Guiping
    Ding, Yanlan
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS SYMPOSIA, PROCEEDINGS, 2008, : 63 - 68
  • [7] Formal Analysis of Smart Contract Based on Colored Petri Nets
    Duo, Wang
    Xin, Huang
    Xiaofeng, Ma
    [J]. IEEE INTELLIGENT SYSTEMS, 2020, 35 (03) : 19 - 29
  • [8] TOWARDS A MODULAR ANALYSIS OF COLORED PETRI NETS
    CHRISTENSEN, S
    PETRUCCI, L
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 616 : 113 - 133
  • [9] Formal Specification and Verification of Cloud Resource Allocation Using Timed Petri-Nets
    Cheikhrouhou, Saoussen
    Chabouh, Nesrine
    Kallel, Slim
    Maamar, Zakaria
    [J]. NEW TRENDS IN MODEL AND DATA ENGINEERING (MEDI 2018), 2018, 929 : 40 - 49
  • [10] Colored Petri Nets Based Modeling of Information Flow Security
    Wu, Ruoyu
    Li, Weiguo
    Huang, He
    [J]. WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 681 - 684