FORVEST: A Support Tool for Formal Verification of Security Specifications with ISO/IEC 15408

被引:5
|
作者
Yajima, Kenichi [1 ]
Morimoto, Shoichi [2 ]
Horie, Daisuke [1 ]
Azreen, Noor Sheila [1 ]
Goto, Yuichi [1 ]
Cheng, Jingde [1 ]
机构
[1] Saitama Univ, Dept Informat & Comp Sci, Saitama 3388570, Japan
[2] Adv Inst Ind Technol, Sch Ind Technol, Tokyo 1400011, Japan
关键词
D O I
10.1109/ARES.2009.74
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It is very important to formally verify security specifications of information systems for ensuring their security. Thus we have proposed a formal verification method of security specifications with ISO/IEC 15408. However to use the method, verifiers have to be familiar with Z notation, linear temporal logic, NuSMV input language, theorem proving, model checking, and ISO/IEC 15408. Moreover, the verifiers also have to prepare some tools supporting the formal verification. Therefore, the verifiers cannot utilize the method easily. To easily verify security specifications based on the method, this paper presents a support tool for the method, named "FORVEST". FORVEST supports the verifiers by guiding the verifiers appropriately and providing information of Z notation, linear temporal logic, theorem proving, model checking, and ISO/IEC 15408 when they are needed. FORVEST also provides an environment where verifiers can access and use tools of model checking and theorem proving through a Web browser By using FORVEST, verifiers can easily perform the formal verification.
引用
收藏
页码:624 / +
页数:2
相关论文
共 31 条
  • [1] Supporting Verification and Validation of Security Targets with ISO/IEC 15408
    Bao, Da
    Miura, Junichi
    Zhang, Ning
    Goto, Yuichi
    Cheng, Jingde
    [J]. PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2621 - 2628
  • [2] A Supporting Tool for IT System Security Specification Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Goto, Yuichi
    Cheng, Jingde
    [J]. TRENDS AND APPLICATIONS IN KNOWLEDGE DISCOVERY AND DATA MINING: PAKDD 2019 WORKSHOPS, 2019, 11607 : 3 - 14
  • [3] Advanced Security Assurance Case Based on ISO/IEC 15408
    Potii, Oleksandr
    Illiashenko, Oleg
    Komin, Dmitry
    [J]. THEORY AND ENGINEERING OF COMPLEX SYSTEMS AND DEPENDABILITY, 2015, 365 : 391 - 401
  • [4] GEST: A Generator of ISO/IEC 15408 Security Target Templates
    Horie, Daisuke
    Yajima, Kenichi
    Azimah, Noor
    Goto, Yuichi
    Cheng, Jingde
    [J]. COMPUTER AND INFORMATION SCIENCE 2009, 2009, 208 : 149 - 158
  • [5] A security requirement management database based on ISO/IEC 15408
    Morimoto, S
    Horie, D
    Cheng, JD
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 1 - 10
  • [6] Development of Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045
    Bao, Da
    Sun, Wen
    Goto, Yuichi
    Cheng, Jingde
    [J]. 2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 204 - 209
  • [7] Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408
    Lee, Eun-Ser
    Kim, Haeng-Kon
    Hwang, Sun-Myoung
    [J]. SERA 2007: 5TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT, AND APPLICATIONS, PROCEEDINGS, 2007, : 25 - +
  • [8] Challenges and Opportunities in the Information Systems Security Evaluation and Position of ISO/IEC 15408
    Vali, Nasser
    Modiri, Nasser
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 321 - +
  • [9] An ISO/IEC 15408-2 Compliant Security Auditing System with Blockchain Technology
    Cha, Shi-Cho
    Yeh, Kuo-Hui
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [10] Evaluating the security levels of the Web-Portals based on the standard ISO/IEC 15408
    Hoang Dang Hai
    Pham Thieu Nga
    [J]. PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON INFORMATION AND COMMUNICATION TECHNOLOGY (SOICT 2018), 2018, : 463 - 469