Behavioral Equivalence of Security-Oriented Interactive Systems

被引:9
|
作者
Liu, Guanjun [1 ]
Jiang, Changjun [2 ]
机构
[1] Tongji Univ, Dept Comp Sci, Shanghai 201804, Peoples R China
[2] Tongji Univ, Key Lab, Minist Educ Embedded Syst & Serv Comp, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
interactive systems; labelled petri nets; labelled transition systems; bisimulation; security; VERIFICATION;
D O I
10.1587/transinf.2015INP0017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.
引用
收藏
页码:2061 / 2068
页数:8
相关论文
共 50 条
  • [1] A Security-Oriented Manual Quality Sampling Methodology for Water Systems
    Demetrios G. Eliades
    Marios M. Polycarpou
    Bambos Charalambous
    Water Resources Management, 2011, 25 : 1219 - 1228
  • [2] A Security-Oriented Manual Quality Sampling Methodology for Water Systems
    Eliades, Demetrios G.
    Polycarpou, Marios M.
    Charalambous, Bambos
    WATER RESOURCES MANAGEMENT, 2011, 25 (04) : 1219 - 1228
  • [3] A Security-oriented Workflow Framework for Collaborative Environments
    Hussain, Sardar
    Sinnott, Richard O.
    Poet, Ron
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 707 - 714
  • [4] Supporting security-oriented, collaborative nanoCMOS electronics research
    Sinnott, Richard O.
    Doherty, Thomas
    Martin, David
    Millar, Campbell
    Stewart, Gordon
    Watt, John
    COMPUTATIONAL SCIENCE - ICCS 2008, PT 1, 2008, 5101 : 96 - 105
  • [5] An architecture for security-oriented perfective maintenance of legacy software
    Cotroneo, D
    Mazzeo, A
    Romano, L
    Russo, S
    INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (09) : 619 - 631
  • [6] A Security-Oriented Data-Sharing Scheme Based on Blockchain
    Ma, Wei
    Wei, Xibei
    Wang, Longlong
    APPLIED SCIENCES-BASEL, 2024, 14 (16):
  • [7] On a Security-oriented Design Framework for Medical IoT Devices: The Hardware Security Perspective
    Nomikos, Konstantinos
    Papadimitriou, Athanasios
    Stergiopoulos, George
    Koutras, Dimitris
    Psarakis, Mihalis
    Kotzanikolaou, Panayiotis
    2020 23RD EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2020), 2020, : 301 - 308
  • [8] A Security-Oriented Overview of Federated Learning Utilizing Layered Reference Model
    Lu, Jiaxing
    Fukumoto, Norihiro
    Nakao, Akihiro
    IEEE ACCESS, 2024, 12 : 103949 - 103975
  • [9] Security-Oriented Architecture for Blockchain-Based Federated Learning in the Financial Industry
    Guo, Zhengxin
    Chen, Shizhan
    Wang, Chao
    Wu, Hongyue
    Ma, Kai
    Feng, Zhiyong
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 465 - 470
  • [10] SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures
    Zonouz, Saman
    Davis, Charles M.
    Davis, Katherine R.
    Berthier, Robin
    Bobba, Rakesh B.
    Sanders, William H.
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 3 - 13