Behavioral Equivalence of Security-Oriented Interactive Systems

被引:9
|
作者
Liu, Guanjun [1 ]
Jiang, Changjun [2 ]
机构
[1] Tongji Univ, Dept Comp Sci, Shanghai 201804, Peoples R China
[2] Tongji Univ, Key Lab, Minist Educ Embedded Syst & Serv Comp, Shanghai 201804, Peoples R China
基金
中国国家自然科学基金;
关键词
interactive systems; labelled petri nets; labelled transition systems; bisimulation; security; VERIFICATION;
D O I
10.1587/transinf.2015INP0017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the determinism and nondeterminism affect the interactional behavior of interactive systems and thus the notion of language does not features the interactional behavior. Therefore, Milner proposed the notion of (weak) bisimulation to solve this problem. With the development of internet, more and more interactive systems occur in the world, such as electronic trading system. Security is one of the most important topics for these systems. We find that different security policies can also affect the interactional behavior of a system, which exactly is the reason why a good policy can strengthen the security. In other words, two interactive systems with different security policies are not of an equivalent behavior although their functions (or business processes) are identical. However, the classic (weak) bisimulation theory draws an opposite conclusion that their behaviors are equivalent. The notion of (weak) bisimulation is not suitable for these security-oriented interactive systems since it does not consider a security policy. This paper proposes the concept of secure bisimulation in order to solve the above problem.
引用
收藏
页码:2061 / 2068
页数:8
相关论文
共 50 条
  • [41] Scalable Security Enforcement for Cyber Physical Systems
    Baird, Alex
    Panda, Abhinandan
    Pearce, Hammond
    Pinisetty, Srinivas
    Roop, Partha
    IEEE ACCESS, 2024, 12 : 14385 - 14410
  • [42] A logical approach to multilevel security of probabilistic systems
    Gray, JW
    Syverson, PF
    DISTRIBUTED COMPUTING, 1998, 11 (02) : 73 - 90
  • [43] Security model of service oriented computational grids
    Jana, Debasish
    Chaudhuri, Amritava
    Bhaumik, Bijan Bihari
    2006 ANNUAL IEEE INDIA CONFERENCE, 2006, : 516 - +
  • [44] Object oriented generic security service API
    Gibson, S
    Gorain, S
    Povey, D
    WEB TECHNOLOGIES AND APPLICATIONS, 1998, : 53 - 62
  • [45] Security Aspects in Education Oriented Multimedia Networks
    Londak, Juraj
    Podhradsky, Pavol
    Truchly, Peter
    PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SYSTEMS, SIGNALS AND IMAGE PROCESSING, (IWSSIP 2016), 2016, : 229 - 232
  • [46] Complete formal systems for equivalence problems
    Sénizergues, G
    THEORETICAL COMPUTER SCIENCE, 2000, 231 (02) : 309 - 334
  • [47] Progression in Biometric Recognition Systems and its Security
    Annavarapu A.
    Borra S.
    Thanki R.
    Recent Patents on Engineering, 2022, 16 (01):
  • [48] SECURITY COST ANALYSIS OF CITIZEN ORIENTED APPLICATIONS
    Ivan, Ion
    Palaghita, Dragos
    Vintila, Bogdan
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON BUSINESS EXCELLENCE, VOL 1, 2010, : 243 - 246
  • [49] Security through aspect-oriented programming
    De Win, B
    Vanhaute, B
    De Decker, B
    ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 125 - 138
  • [50] Security Through Behavioral Biometrics and Artificial Intelligence
    Purgason, Benjamin
    Hibler, David
    COMPLEX ADAPTIVE SYSTEMS 2012, 2012, 12 : 398 - 403