Intruder deducibility constraints with negation. Decidability and application to secured service compositions

نویسندگان

  • Tigran Avanesov
  • Yannick Chevalier
  • Michaël Rusinowitch
  • Mathieu Turuani
چکیده

The problem of finding a mediator to compose secured services has been reduced in our former work to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. We extend in this paper the mediator synthesis procedure by a construction for expressing that some data is not accessible to the mediator. Then we give a decision procedure for verifying that a mediator satisfying this non-disclosure policy can be effectively synthesized. This procedure has been implemented in CL-AtSe, our protocol analysis tool. The procedure extends constraint solving for cryptographic protocol analysis in a significative way as it is able to handle negative deducibility constraints without restriction. In particular it applies to all subterm convergent theories and therefore covers several interesting theories in formal security analysis including encryption, hashing, signature and pairing. Key-words: Web services, orchestration, security policy, separation of duty, deducibility constraints, cryptographic protocols, formal methods, tool ∗ This work is supported by FP7 AVANTSSAR [4] and FP7 NESSoS [20] projects. † INRIA Nancy Grand Est, France. Email: {rusi, turuani}@inria.fr ‡ IRIT, Université de Toulouse, France. Email: [email protected] § SnT, Université du Luxembourg, Luxembourg. Email: [email protected] ha l-0 07 19 01 1, v er si on 1 18 J ul 2 01 2 Contraintes de deducibilité avec négation Résumé : Voir “Abstract” Mots-clés : Services Web, orchestration, politique de sécurité, séparation des tâches, contraintes de deducibilité, protocoles de sécurité, méthodes formelles, util ha l-0 07 19 01 1, v er si on 1 18 J ul 2 01 2 Intruder deducibility constraints with negation. 3

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions

We consider the problem of deciding the security of cryptographic protocols for a bounded number of sessions, taking into account some algebraic properties of the security primitives, for instance Abelian group properties. We propose a general method for deriving decision algorithms, splitting the task into 4 properties of the rewriting system describing the intruder capabilities: locality, con...

متن کامل

Combining Algorithms for Deciding Knowledge in Security Protocols

In formal approaches, messages sent over a network are usually modeled by terms together with an equational theory, axiomatizing the properties of the cryptographic functions (encryption, exclusive or, . . . ). The analysis of cryptographic protocols requires a precise understanding of the attacker knowledge. Two standard notions are usually used: deducibility and indistinguishability. Those no...

متن کامل

Deducibility Constraints, Equational Theory and Electronic Money

The starting point of this work is a case study (from France Télécom) of an electronic purse protocol. The goal was to prove that the protocol is secure or that there is an attack. Modeling the protocol requires algebraic properties of a fragment of arithmetic, typically containing modular exponentiation. The usual equational theories described in papers on security protocols are too weak: the ...

متن کامل

Orchestration under Security Constraints

Automatic composition of web services is a challenging task. Many works have considered simplified automata models that abstract away from the structure of messages exchanged by the services. For the domain of secured services (using e.g. digital signing or timestamping) we propose a novel approach to automated composition of services based on their security policies. Given a community of servi...

متن کامل

QoS Web Service Security Dynamic Intruder Detection System for HTTP SSL services

Web services are expected to play significant role for message communications over internet applications. Most of the future work is web security. Online shopping and web services are increasing at rapid rate. In this paper we presented the fundamental concepts related to Network security, web security threats. QoS web service security intrusion detection is important concern in network communi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Symb. Comput.

دوره 80  شماره 

صفحات  -

تاریخ انتشار 2017