The Application of Model Checking in Validating Information System Software Security

被引:0
|
作者
Liu Xin [1 ]
Cai Wandong [1 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
来源
2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III | 2010年
关键词
software security; validation; model checking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the effectiveness of model checking in validating information system software security, and give the formal definition for these two properties. A model checking based security policy validation and verification method is proposed to validate the consistency and completeness for security policy. This method can also be used to generate a validation sequence. Finally, we'll discuss our availability and reliability of validation methods:
引用
收藏
页码:448 / 451
页数:4
相关论文
共 50 条
  • [1] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [2] Software Model Checking for Mobile Security - Collusion Detection in K
    Asavoae, Irina Mariuca
    Hoang Nga Nguyen
    Roggenbach, Markus
    MODEL CHECKING SOFTWARE, SPIN 2018, 2018, 10869 : 3 - 25
  • [3] Checking security properties by model checking
    De Francesco, N
    Lettieri, G
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2003, 13 (03) : 181 - 196
  • [4] NSPK Protocol Security Model Checking System Builder
    Yan, Wang
    Ying, Liu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 307 - 315
  • [5] Model Checking the Information Flow Security of Real-Time Systems
    Gerking, Christopher
    Schubert, David
    Bodden, Eric
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 27 - 43
  • [6] Model Checking of Software Development in Distributed Animation Rendering System
    Hong, Zhiguo
    Wang, Yongbin
    Shi, Minyong
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1575 - 1579
  • [7] Applying model checking to destructive testing and analysis of software system
    Kumamoto, Hiroki
    Mizuno, Takahisa
    Narita, Kensuke
    Nishizaki, Shin-ya
    Journal of Software, 2013, 8 (05) : 1254 - 1261
  • [8] Model Checking of Software for Microcontrollers
    Schlich, Bastian
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2010, 9 (04)
  • [9] Model checking: Software and beyond
    Clarke, Edmund M.
    Lerda, Flavio
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2007, 13 (05) : 639 - 649
  • [10] Towards Model-Checking Security of Real-Time Java']Java Software
    Spalazzi, Luca
    Spegni, Francesco
    Liva, Giovanni
    Pinzger, Martin
    PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS), 2018, : 642 - 649