Behavioral Equivalence of Security-Oriented Interactive Systems

被引:9
|
作者
Liu, Guanjun [1 ]
Jiang, Changjun [2 ]
机构
[1] Tongji Univ, Dept Comp Sci, Shanghai 201804, Peoples R China
[2] Tongji Univ, Key Lab, Minist Educ Embedded Syst & Serv Comp, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
interactive systems; labelled petri nets; labelled transition systems; bisimulation; security; VERIFICATION;
D O I
10.1587/transinf.2015INP0017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.
引用
收藏
页码:2061 / 2068
页数:8
相关论文
共 50 条
  • [31] Formal Verification of Differential Privacy for Interactive Systems
    Tschantz, Michael Carl
    Kaynar, Dilsun
    Datta, Anupam
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2011, 276 : 61 - 79
  • [32] Verifying Opacity Properties in Security Systems
    Mu, Chunyan
    Clark, David
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (02) : 1450 - 1460
  • [33] Validating the Behavioral Equivalence of TTCN-3 Test Cases
    Makedonski, Philip
    Grabowski, Jens
    Neukirchen, Helmut
    2009 FIRST INTERNATIONAL CONFERENCE ON ADVANCES IN SYSTEM TESTING AND VALIDATION LIFECYCLE, 2009, : 117 - +
  • [34] DEEPSEC: Deciding Equivalence Properties in Security Protocols Theory and Practice
    Cheval, Vincent
    Kremer, Steve
    Rakotonirina, Itsaka
    2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, : 529 - 546
  • [35] A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties
    Véronique Cortier
    Stéphanie Delaune
    Vaishnavi Sundararajan
    Journal of Automated Reasoning, 2021, 65 : 479 - 520
  • [36] A Decidable Class of Security Protocols for Both Reachability and Equivalence Properties
    Cortier, Veronique
    Delaune, Stephanie
    Sundararajan, Vaishnavi
    JOURNAL OF AUTOMATED REASONING, 2021, 65 (04) : 479 - 520
  • [37] Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems
    Froeschle, Sibylle
    CORRECT SYSTEM DESIGN: SYMPOSIUM IN HONOR OF ERNST-RUDIGER OLDEROG ON THE OCCASION OF HIS 60TH BIRTHDAY, 2015, 9360 : 83 - 98
  • [38] On Security Analysis of Periodic Systems: Expressiveness and Complexity
    Alturki, Musab A.
    Kirigin, Tajana Ban
    Kanovich, Max
    Nigam, Vivek
    Scedrov, Andre
    Talcott, Carolyn
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 43 - 54
  • [39] Security Issues of Service-Oriented Middleware
    Al-Jaroodi, Jameela
    Al-Dhaheri, Alyaziyah
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 153 - 160
  • [40] Independent policy oriented layering of security services
    Leitold, H
    Lipp, P
    Sterbenz, A
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 89 - 98