Specification and Refinement of Secure IT - Systems — Extended
نویسندگان
چکیده
Dependable IT-systems [11] of relevant size can only be built if all dependability attributes have a clear meaning. This meaning must be consistent both with the common understanding of the people building and using the ITsystem, and with the tools they use and the development process they adhere to. Therefore, a formal meaning of all dependability attributes is needed which is compatible with the usual refinement process of systems engineering. Consider the meaning of security attributes. Some relationships with established formal notions are clear whereas others are not understood so well. Confidentiality, integrity, and availability are seen as the generic properties of security [17, 5]. Some authors propose to add accountability as a fourth one [4], others propose to refine confidentiality, integrity and availability according to the kind of information they relate to [18]. Then, e.g. accountability can be interpreted as an integrity property concerning the circumstances of an action, anonymity can be interpreted as a confidentiality property concerning the circumstances of a communication, and so on. The relationship between the security attributes integrity and availability, and formal notions compatible with refinement is roughly clear. For terminating computations, integrity corresponds to partial correctness, and availability corresponds to assured termination combined with sufficient computational resources to fulfill real-time requirements. Integrity and availability together correspond to total correctness and sufficient computational resources. For reactive systems, integrity means that the defined processes satisfy certain required predicates, and availability corresponds to fairness and liveness combined with sufficient computational resources. To date, the relationship between confidentiality and formal notions of refinement is less well understood. One of the reasons is that a possibilistic framework is not enough to prove security in general and confidentiality in particular. Such a framework only makes it possible to find some security flaws. To positively prove security, a probabilistic framework is needed.
منابع مشابه
Freefinement Stephan van Staden ETH Zurich
Freefinement is an algorithm that constructs a sound refinement calculus from a verification system under certain conditions. In this paper, a verification system is any formal system for establishing whether an inductively defined term, typically a program, satisfies a specification. Examples of verification systems include Hoare logics and type systems. Freefinement first extends the term lan...
متن کاملPreserving (Security) Properties under Action Refinement
In the design process of distributed systems we may have to replace abstract specifications of components by more concrete specifications, thus providing more detailed design information. In the context of process algebra this well-known approach is often referred to as action refinement. In this paper we study the relationships between action refinement, compositionality, and (security) proces...
متن کاملSpecifying and Verifying the Steam-Boiler Control System with Time Extended LOTOS
The paper presents a specification of the steam boiler system in Time Extended LOTOS as an example to describe real-time, hybrid systems containing parts with discrete and continuous behavior in a time extended process-algebraic formalism. The specification has been developed in three design steps — the specification of functional behavior in LOTOS, the specification of timed behavior in TE-LOT...
متن کاملA Spatio-Temporal Logic for the Specification and Refinement of Mobile Systems
We define a variant of Lamport’s Temporal Logic of Actions, extended by spatial modalities, that is intended for the specification of mobile systems with distributed state. We discuss notions of refinement appropriate for mobile systems, specifically concerning the topological structure of the system, and show how these can be represented in the logic via quantification and implication, ensurin...
متن کاملMethods and Tools for the Verification of Critical Properties
This paper discusses methods for the formal treatment of critical systems. The discussion is based on experience at ICL in the application of formal methods to the development of highly assured secure systems. Problems arising in the use of the standard paradigm for specification and refinement in Z are identified and discussed. Alternative methods which overcome some of these difficulties are ...
متن کاملSignal Design at lsolated lntersecaions Using Expert Systems Technology
The procedural steps for developing an expert system for designing signals at isolated intersections are described and the most important development issues for each step are discussed. The steps include problem analysis and definition, preliminary prototype specification, knowledge acquisition strategy development, prototype development plan, knowledge extraction, knowledge representation, too...
متن کامل