Bisimulation and unwinding for verifying possibilistic security properties

被引:0
|
作者
Bossi, A [1 ]
Focardi, R [1 ]
Piazza, C [1 ]
Rossi, S [1 ]
机构
[1] Univ Ca Foscari, Dipartimento Informat, Venice, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We study bisimulation-based information flow security properties which are persistent, in the sense that if a system is secure, then all states reachable from it are secure too. We show that such properties can be characterized in terms of bisimulation-like equivalence relations between the system and the system itself prevented from performing confidential actions. Moreover, we provide a characterization of such properties in terms of unwinding conditions which-demand properties of individual actions. These two different characterizations naturally lead to efficient methods for the verification and construction of secure systems. We also prove several compositionality results and discuss a sufficient condition to define refinement operators preserving security.
引用
收藏
页码:223 / 237
页数:15
相关论文
共 50 条
  • [41] A Z based approach to verifying security protocols
    Long, BW
    Fidge, CJ
    Cerone, A
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
  • [42] Verifying second-level security protocols
    Bella, G
    Longo, C
    Paulson, LC
    [J]. THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 2003, 2758 : 352 - 366
  • [43] Verifying security Protocols modelled by networks of automata
    Kurkowski, Miroslaw
    Penczek, Wojciech
    [J]. FUNDAMENTA INFORMATICAE, 2007, 79 (3-4) : 453 - 471
  • [44] Advancing the Automation Capability of Verifying Security Protocols
    Wang, Wansen
    Huang, Wenchao
    Meng, Zhaoyi
    Xiong, Yan
    Su, Cheng
    [J]. IEEE Transactions on Dependable and Secure Computing, 2024, 21 (06) : 5059 - 5070
  • [45] Verifying Security Policies Using Host Attributes
    Diekmann, Cornelius
    Posselt, Stephan-A.
    Niedermayer, Heiko
    Kinkelin, Holger
    Hanka, Oliver
    Carle, Georg
    [J]. FORMAL TECHNIQUES FOR DISTRIBUTED OBJECTS, COMPONENTS, AND SYSTEMS, 2014, 8461 : 133 - 148
  • [46] Verifying Extended Criteria for the Interoperability of Security Devices
    Talamo, Maurizio
    Arcieri, Franco
    Della Penna, Giuseppe
    Dimitri, Andrea
    Intrigila, Benedetto
    Magazzeni, Daniele
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS, 2008, 5332 : 1131 - +
  • [47] Enabling food security by verifying agricultural carbon
    Kahiluoto, H.
    Smith, P.
    Moran, D.
    Olesen, J. E.
    [J]. NATURE CLIMATE CHANGE, 2014, 4 (05) : 309 - 311
  • [48] Enabling food security by verifying agricultural carbon
    H. Kahiluoto
    P. Smith
    D. Moran
    J. E. Olesen
    [J]. Nature Climate Change, 2014, 4 : 309 - 311
  • [49] VERIFYING SOLUTIONS TO LWE WITH IMPLICATIONS FOR CONCRETE SECURITY
    Sarkar, Palash
    Singha, Subhadip
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2021, 15 (02) : 257 - 266
  • [50] An intruder model for verifying liveness in security protocols
    Department of Computer Science, University of Twente, P.O. Box 217, 7500 AE Enschede, Netherlands
    不详
    [J]. Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (23-32):