CoPS - Checker of Persistent Security

نویسندگان

  • Carla Piazza
  • Enrico Pivato
  • Sabina Rossi
چکیده

CoPS is an automatic checker of multilevel system security properties. CoPS can be used to check three different bisimulation-based non-interference properties for systems expressed as terms of the Security Process Algebra (SPA) language. The considered properties are persistent, in the sense that they are preserved at each execution step. Moreover, they imply the Bisimulation-based Non Deducibility on Composition (BNDC ) property, whose decidability is still an open problem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The COPS Security Checker System

In the past several years there have been a large number of pub lished works that have graphically described a wide variety of security problems particular to Unix Without fail the same problems have been discussed over and over again describing the problems with SUID set user ID programs improper le permissions and bad passwords to name a few There are two common characteristics to each of the...

متن کامل

Performance Study of COPS over TLS and IPsec Secure Session

This paper evaluates the performance of COPS over secure TLS and IPsec connections. For large size data, when we apply authentication and encryption, the throughput degrades compared with the throughput without authentication or encryption. COPS has native security mechanisms, but it also has limitations. As defined in RFC 2478, COPS includes no standard key management and no data privacy hop-b...

متن کامل

A Longitudinal Comparison of Four Password Procedures

Computer security has become a central concern in this age of technology. Vast and ever-increasing amounts of confidential and/or proprietary data are stored and transmitted electronically, making security issues a vital concern. The primary method of preventing unauthorized access to sensitive data has been to authenticate users through the use of passwords. We have completed a pilot study and...

متن کامل

Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security

The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for authorized organizational end users. User authentication is a foundation procedure in the overall pursuit of these objectives, and password procedures have historically been the primary method of user authentication. Th...

متن کامل

Selfish Cops and Adversarial Robber: Multi-Player Pursuit Evasion on Graphs

We introduce and study the game of " Selfish Cops and Adversarial Robber " (SCAR) which is an N-player generalization of the " classic " two-player cops and robbers (CR) game. We prove that SCAR has a Nash equilibrium in deterministic strategies.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004