Bisimulation and unwinding for verifying possibilistic security properties

被引:0
|
作者
Bossi, A [1 ]
Focardi, R [1 ]
Piazza, C [1 ]
Rossi, S [1 ]
机构
[1] Univ Ca Foscari, Dipartimento Informat, Venice, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We study bisimulation-based information flow security properties which are persistent, in the sense that if a system is secure, then all states reachable from it are secure too. We show that such properties can be characterized in terms of bisimulation-like equivalence relations between the system and the system itself prevented from performing confidential actions. Moreover, we provide a characterization of such properties in terms of unwinding conditions which-demand properties of individual actions. These two different characterizations naturally lead to efficient methods for the verification and construction of secure systems. We also prove several compositionality results and discuss a sufficient condition to define refinement operators preserving security.
引用
收藏
页码:223 / 237
页数:15
相关论文
共 50 条
  • [31] Verifying software security-is it possible?
    Bradbury, Danny
    [J]. Network Security, 2013, 2013 (01) : 5 - 7
  • [32] Weak bisimulation for Probabilistic timed automata and applications to security
    Lanotte, R
    Maggiolo-Schettini, A
    Troina, A
    [J]. FIRST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2003, : 34 - 43
  • [33] Verifying Parameterized Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FM 2015: FORMAL METHODS, 2015, 9109 : 342 - 359
  • [34] TAuth: Verifying Timed Security Protocols
    Li, Li
    Sun, Jun
    Liu, Yang
    Dong, Jin Song
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2014, 2014, 8829 : 300 - 315
  • [35] Case study: verifying a security protocol
    不详
    [J]. ISABELLE/HOL, 2002, 2283 : 195 - 204
  • [36] Verifying security protocols: An application of CSP
    Schneider, S
    Delicata, R
    [J]. COMMUNICATING SEQUENTIAL PROCESSES: THE FIRST 25 YEARS, 2005, 3525 : 243 - 263
  • [37] Verifying Implementations of Security Protocols by Refinement
    Polikarpova, Nadia
    Moskal, Michal
    [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
  • [38] Properties of Possibilistic String Comparison
    Bronselaer, Antoon
    De Tre, Guy
    [J]. IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2010, 18 (02) : 312 - 325
  • [39] Analyzing security protocols by a bisimulation method based on environmental knowledge
    Lü, YH
    Gu, YG
    Chen, XR
    Fu, Y
    [J]. 2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 79 - 83
  • [40] The Simplified Inductive Approach to Verifying Security Protocols
    Wang Juan
    Zhou Yajie
    Mang Huanguo
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526