Academia.eduAcademia.edu

Outline

Checking Unwinding Conditions for Finite State Systems

2000

Abstract

We consider the problem of checking the unwinding condi- tions of Mantel for Basic Security Predicates (BSP's) (7), for nite-state systems. We show how the unwinding conditions can be simplied to checking conditions on a maximal simulation relation. We conclude that the time complexity of verifying BSP's via the unwinding route compares favourably with the model-checking technique proposed in (2).

References (12)

  1. Thomas H. Cormen, Clifford Stein, Ronald L. Rivest, and Charles E. Leiserson. Introduction to Algorithms. McGraw-Hill Higher Education, 2001.
  2. Deepak D'Souza, Raghavendra K R, and Barbara Sprick. An automata based approach for verifying information flow properties. In Proceedings of the second workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005), volume 135, pages 39-58, 2005.
  3. J. A. Goguen and J. Meseguer. Security policies and security models. In Proc. IEEE Symp. on Security and Privacy, pages 11-20, April 1982.
  4. Joseph A. Goguen and José Meseguer. Unwinding and inference control. In IEEE Symposium on Security and Privacy, pages 75-87, 1984.
  5. Monika Rauch Henzinger, Thomas A. Henzinger, and Peter W. Kopke. Computing simulations on finite and infinite graphs. In IEEE Symposium on Foundations of Computer Science, pages 453-462, 1995.
  6. Heiko Mantel. Possibilistic Definitions of Security -An Assembly Kit. In Proceed- ings of the 13th IEEE Computer Security Foundations Workshop, pages 185-199, Cambridge, UK, July 3-5 2000. IEEE Computer Society.
  7. Heiko Mantel. A Uniform Framework for the Formal Specification and Verification of Information Flow Security. PhD thesis, Universität des Saarlandes, 2003.
  8. John McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symposium on Research in Security and Privacy, pages 79 -93. IEEE Computer Society Press, 1994.
  9. Colin O'Halloran. A calculus of information flow. In Proceedings of the European Symposium on Research in Computer Security, ESORICS 90, 1990.
  10. Robert Paige and Robert E. Tarjan. Three partition refinement algorithms. SIAM J. Comput., 16(6):973-989, 1987.
  11. John Rushby. Noninterference, transitivity, and channel-control security policies. Technical report, dec 1992.
  12. A. Zakinthinos and E. S. Lee. A general theory of security properties. In SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 94, Washington, DC, USA, 1997. IEEE Computer Society.