CoPS - Checker of Persistent Security
نویسندگان
چکیده
CoPS is an automatic checker of multilevel system security properties. CoPS can be used to check three different bisimulation-based non-interference properties for systems expressed as terms of the Security Process Algebra (SPA) language. The considered properties are persistent, in the sense that they are preserved at each execution step. Moreover, they imply the Bisimulation-based Non Deducibility on Composition (BNDC ) property, whose decidability is still an open problem.
منابع مشابه
The COPS Security Checker System
In the past several years there have been a large number of pub lished works that have graphically described a wide variety of security problems particular to Unix Without fail the same problems have been discussed over and over again describing the problems with SUID set user ID programs improper le permissions and bad passwords to name a few There are two common characteristics to each of the...
متن کاملPerformance Study of COPS over TLS and IPsec Secure Session
This paper evaluates the performance of COPS over secure TLS and IPsec connections. For large size data, when we apply authentication and encryption, the throughput degrades compared with the throughput without authentication or encryption. COPS has native security mechanisms, but it also has limitations. As defined in RFC 2478, COPS includes no standard key management and no data privacy hop-b...
متن کاملA Longitudinal Comparison of Four Password Procedures
Computer security has become a central concern in this age of technology. Vast and ever-increasing amounts of confidential and/or proprietary data are stored and transmitted electronically, making security issues a vital concern. The primary method of preventing unauthorized access to sensitive data has been to authenticate users through the use of passwords. We have completed a pilot study and...
متن کاملIntroducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security
The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. Th...
متن کاملSelfish Cops and Adversarial Robber: Multi-Player Pursuit Evasion on Graphs
We introduce and study the game of " Selfish Cops and Adversarial Robber " (SCAR) which is an N-player generalization of the " classic " two-player cops and robbers (CR) game. We prove that SCAR has a Nash equilibrium in deterministic strategies.
متن کامل