Model Checking Techniques for Security Policies in Distributed Collaboration

نویسندگان

  • Tanvir Ahmed
  • Anand R. Tripathi
چکیده

In this paper, we present the hallenges for model he king se urity poli ies in distributed ollaboration systems. The spe i ation of a ollaboration system is onverted to nite state based veri ation models and are veri ed using a model he ker for orre tness and onsisten y. The main hallenge in nite state based model he king is the state spa e explosion. A related problem for verifying se urity properties is to nd a minimal number of parti ipants whose identities need to be modeled during veri ation. The goal of this paper if to nd the minimal number of parti ipants that is suÆ ient to verify a given set of requirements. Importantly, we ensure that the requirements are not violated if more than the minimal number of users parti ipate in the ollaboration.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security policies for distributed systems

A security policy specifies a security property as the maximal information flow. A distributed system composed of interacting processes implicitly defines an intransitive security policy by repudiating direct information flow between processes that do not exchange messages directly. We show that implicitly defined security policies in distributed systems are enforced, provided that processes ru...

متن کامل

Analysis of Intersectoral Collaboration in the Iranian Health System for Implementing Health in all Policies: Challenges and the Way Forward (This Research was Conducted Before the Covoid-19 Pandemic)

Background and Aim: For achievement of equity in the population health the implementation of health in all policies is essential. The most crucial intervention in this approach is inter-sectoral collaboration.  Materials and Methods: This was a qualitative study based on the national policy framework. Data were collected using literature review, in-depth interviews and focus group discussions ...

متن کامل

A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

متن کامل

Abstraction Based Verification of a Parameterised Policy Controlled System

ion Based Verification of a Parameterised Policy Controlled System Peter Ochsenschläger and Roland Rieke ? Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany {ochsenschlaeger,rieke}@sit.fraunhofer.de Abstract. Safety critical and business critical systems are usually controlled by policies with the objective to guarantee a variety of safety, liveness and security pro...

متن کامل

Model-driven Engineering of Functional Security Policies

This paper describes an ongoing project on the specification and automatic implementation of functional security policies. We advocate a clear separation between functional behavior and functional security requirements. We propose a formal language to specify functional security policies. We are developing techniques by which a formal functional security policy can be automatically implemented....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004