A Process Algebra for (Delimited) Persistent Stochastic Non-Interference

被引:1
作者
Marin, Andrea [1 ]
Piazza, Carla [2 ]
Rossi, Sabina [1 ]
机构
[1] Univ Ca Foscari Venezia, Venice, Italy
[2] Univ Udine, Udine, Italy
来源
QUANTITATIVE EVALUATION OF SYSTEMS (QEST 2019) | 2019年 / 11785卷
关键词
INFORMATION-FLOW SECURITY;
D O I
10.1007/978-3-030-30281-8_13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we consider the information flow security properties named Persistent Stochastic Non-Interference (PSNI) and Delimited Persistent Stochastic Non-Interference (D_PSNI) for stochastic cooperating processes described as terms of the Performance Evaluation Process Algebra (PEPA). A PEPA process P that satisfies (D)_PSNI admits only controlled information flows from the high, private, level of confidentiality to the low, public, one. In particular, the downgrading/declassification of information is permitted only when performed by a trusted component. Once a process has been defined one can only check whether it satisfies (D)_PSNI or not. In this work, we contribute to the verification and construction of secure processes in two respects: (i) first we prove new compositionality properties for (D)_PSNI and then (ii) we exploit them in order to introduce a new process algebra which allows the definition of processes which are secure by construction, thus avoiding any further check.
引用
收藏
页码:222 / 238
页数:17
相关论文
共 43 条
[1]   Lumping-based equivalences in Markovian automata: Algorithms and applications to product-form analyses [J].
Alzetta, Giacomo ;
Marin, Andrea ;
Piazza, Carla ;
Rossi, Sabina .
INFORMATION AND COMPUTATION, 2018, 260 :99-125
[2]  
[Anonymous], 2021, TECHN COMM MAR ROB
[3]  
[Anonymous], 2000, J UNIVERS COMPUT SCI
[4]  
[Anonymous], 2003, Electronic Notes in Theoretical Computer Science, DOI DOI 10.1016/J.ENTCS.2004.02.006
[5]   Intransitive non-interference for cryptographic purposes [J].
Backes, M ;
Pfitzmann, B .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :140-152
[6]  
Bodei C, 2001, LECT NOTES COMPUT SC, V2127, P27
[7]   Verifying persistent security properties [J].
Bossi, A ;
Focardi, R ;
Piazza, C ;
Rossi, S .
COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2004, 30 (3-4) :231-258
[8]   A proof system for information flow security [J].
Bossi, A ;
Focardi, R ;
Piazza, C ;
Rossi, S .
LOGIC BASED PROGRAM SYNTHESIS AND TRANSFORMATION, 2003, 2664 :199-218
[9]  
Bossi A, 2003, LECT NOTES COMPUT SC, V2575, P223
[10]   Compositional information flow security for concurrent programs [J].
Bossi, Annalisa ;
Piazza, Carla ;
Rossi, Sabina .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (03) :373-416