Behavioral Equivalence of Security-Oriented Interactive Systems

被引:9
|
作者
Liu, Guanjun [1 ]
Jiang, Changjun [2 ]
机构
[1] Tongji Univ, Dept Comp Sci, Shanghai 201804, Peoples R China
[2] Tongji Univ, Key Lab, Minist Educ Embedded Syst & Serv Comp, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
interactive systems; labelled petri nets; labelled transition systems; bisimulation; security; VERIFICATION;
D O I
10.1587/transinf.2015INP0017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.
引用
收藏
页码:2061 / 2068
页数:8
相关论文
共 50 条
  • [21] Information Systems Security Leadership: An Empirical Study of Behavioral Influences
    Winkfield, Marcus
    Parrish, James
    Tejay, Gurvirender
    AMCIS 2017 PROCEEDINGS, 2017,
  • [22] Behavioral equivalences for AbU: Verifying security and safety in distributed IoT systems
    Pasqua, Michele
    Miculan, Marino
    THEORETICAL COMPUTER SCIENCE, 2024, 998
  • [23] SPEC: An Equivalence Checker for Security Protocols
    Tiu, Alwen
    Nam Nguyen
    Horne, Ross
    PROGRAMMING LANGUAGES AND SYSTEMS, APLAS 2016, 2016, 10017 : 87 - 95
  • [24] Modeling secure systems using an agent-oriented approach and security patterns
    Mouratidis, Haralambos
    Weiss, Michael
    Giorgini, Paolo
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2006, 16 (03) : 471 - 498
  • [25] AN AUTOMATA-THEORETIC APPROACH TO BEHAVIORAL EQUIVALENCE
    DEVADAS, S
    KEUTZER, K
    INTEGRATION-THE VLSI JOURNAL, 1991, 12 (02) : 109 - 129
  • [26] A risk-oriented approach to the control arrangement of security protection subsystems of information systems
    Anisimov V.G.
    Zegzhda P.D.
    Anisimov E.G.
    Bazhin D.A.
    Automatic Control and Computer Sciences, 2016, 50 (8) : 717 - 721
  • [27] Improving Security of Oil Pipeline SCADA Systems Using Service-Oriented Architectures
    Subramanian, Nary
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008 WORKSHOPS, 2008, 5333 : 344 - 353
  • [28] On the Security and Complexity of Periodic Systems
    Alturki M.A.
    Ban Kirigin T.
    Kanovich M.
    Nigam V.
    Scedrov A.
    Talcott C.
    SN Computer Science, 3 (5)
  • [29] Do you like me? Behavioral and physical features for socially and emotionally engaging interactive systems
    Esposito, Anna
    Amorese, Terry
    Cuciniello, Marialucia
    Esposito, Antonietta M.
    Cordasco, Gennaro
    FRONTIERS IN COMPUTER SCIENCE, 2023, 5
  • [30] Equivalence of dynamical systems by bisimulation
    van der Schaft, AJ
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2004, 49 (12) : 2160 - 2172