Behavioral Equivalence of Security-Oriented Interactive Systems

被引:9
|
作者
Liu, Guanjun [1 ]
Jiang, Changjun [2 ]
机构
[1] Tongji Univ, Dept Comp Sci, Shanghai 201804, Peoples R China
[2] Tongji Univ, Key Lab, Minist Educ Embedded Syst & Serv Comp, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
interactive systems; labelled petri nets; labelled transition systems; bisimulation; security; VERIFICATION;
D O I
10.1587/transinf.2015INP0017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.
引用
收藏
页码:2061 / 2068
页数:8
相关论文
共 50 条
  • [11] Security-Oriented Polar Coding Based on Channel-Gain-Mapped Frozen Bits
    Yang, Yuli
    Li, Wenyao
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 21 (08) : 6584 - 6596
  • [12] The North Korea-United States Summit and Possibilities for New Security-Oriented Thinking
    Yanagisawa, Kyoji
    JOURNAL FOR PEACE AND NUCLEAR DISARMAMENT, 2019, 2 (01) : 357 - 369
  • [13] User Security-Oriented Information-Centric IoT Nodes Clustering With Graph Convolution Networks
    Gharib, Anastassia
    Ibnkahla, Mohamed
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (05): : 8311 - 8326
  • [14] SecArch'18: 1st Workshop of Security-Oriented Designs of Computer Architectures and Processors
    Meng, Dan
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2177 - 2177
  • [15] An ensemble-based approach to the security-oriented classification of low-level log traces
    Fazzinga, Bettina
    Folino, Francesco
    Furfaro, Filippo
    Pontieri, Luigi
    EXPERT SYSTEMS WITH APPLICATIONS, 2020, 153
  • [16] VIRTUS: A new processor virtualization architecture for security-oriented next-generation mobile terminals
    Inoue, Hiroaki
    Ikeno, Akihisa
    Kondo, Masaki
    Sakai, Junji
    Edahiro, Masato
    43RD DESIGN AUTOMATION CONFERENCE, PROCEEDINGS 2006, 2006, : 484 - +
  • [17] A novel security scheme for behavioral authentication systems based on keystroke dynamics
    Salem, Asma
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2019, 2 (02):
  • [18] Security Oriented Methodology for Designing Internet of Things Systems
    Robles-Ramirez, David A.
    Escamilla-Ambrosio, Ponciano J.
    Acosta-Bermejo, Raul
    Aguirre-Anaya, Eleazar
    Rodriguez-Mota, Abraham
    Reyes-Torres, Jesus J.
    SMART TECHNOLOGY, 2018, 213 : 96 - 107
  • [19] A Security Oriented Design (SOD) Framework for eHealth Systems
    Yu, Weider D.
    Davuluri, Lavanya
    Radhakrishnan, Monica
    Runiassy, Maryam
    2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014), 2014, : 122 - 127
  • [20] Context-Based Behavioral Equivalence of Components in Self-Adaptive Systems
    Khakpour, Narges
    Sirjani, Marjan
    Goltz, Ursula
    FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 16 - +