Bisimulation and unwinding for verifying possibilistic security properties

被引:0
|
作者
Bossi, A [1 ]
Focardi, R [1 ]
Piazza, C [1 ]
Rossi, S [1 ]
机构
[1] Univ Ca Foscari, Dipartimento Informat, Venice, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We study bisimulation-based information flow security properties which are persistent, in the sense that if a system is secure, then all states reachable from it are secure too. We show that such properties can be characterized in terms of bisimulation-like equivalence relations between the system and the system itself prevented from performing confidential actions. Moreover, we provide a characterization of such properties in terms of unwinding conditions which-demand properties of individual actions. These two different characterizations naturally lead to efficient methods for the verification and construction of secure systems. We also prove several compositionality results and discuss a sufficient condition to define refinement operators preserving security.
引用
收藏
页码:223 / 237
页数:15
相关论文
共 50 条
  • [21] Unwinding conditions for security in imperative languages
    Bossi, A
    Piazza, C
    Rossi, S
    [J]. LOGIC BASED PROGRAM SYNTHESIS AND TRANSFORMATION, 2005, 3573 : 85 - 100
  • [22] Compiling and verifying security protocols
    Jacquemard, F
    Rusinowitch, M
    Vigneron, L
    [J]. LOGIC FOR PROGRAMMING AND AUTOMATED REASONING, PROCEEDINGS, 2000, 1955 : 131 - 160
  • [23] Verifying Security Invariants in ExpressOS
    Mai, Haohui
    Pek, Edgar
    Xue, Hui
    King, Samuel T.
    Madhusudan, P.
    [J]. ACM SIGPLAN NOTICES, 2013, 48 (04) : 293 - 303
  • [24] Verifying security protocols with Brutus
    Clarke, EM
    Jha, S
    Marrero, W
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2000, 9 (04) : 443 - 487
  • [25] Verifying layered security protocols
    Gibson-Robinson, Thomas
    Kamil, Allaa
    Lowe, Gavin
    [J]. JOURNAL OF COMPUTER SECURITY, 2015, 23 (03) : 259 - 307
  • [26] Verifying the independence of security protocols
    Bela, Genge
    Ignat, Iosif
    [J]. ICCP 2007: IEEE 3RD INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2007, : 155 - +
  • [27] Possibilistic definitions of security - An assembly kit
    Mantel, H
    [J]. 13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 185 - 199
  • [28] Verifying the consistency of security policies by abstracting into security types
    Ono, Kouichi
    Nakamura, Yuichi
    Satoh, Fumiko
    Tateishi, Takaaki
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 497 - +
  • [29] Probabilistic bisimulation and equivalence for security analysis of network protocols
    Ramanathan, A
    Mitchell, J
    Scedrov, A
    Teague, V
    [J]. FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, PROCEEDINGS, 2004, 2987 : 468 - 483
  • [30] Verifying security protocols by knowledge analysis
    School of Systems Engineering, The University of Reading, Reading, United Kingdom
    不详
    不详
    [J]. Int. J. Secur. Netw., 2008, 3 (183-192): : 183 - 192