1,028
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      An Iterative Approach for the Satisfaction of Security Using the Intransitive Non-Interference Property

      Published
      proceedings-article
      , , ,
      Fifth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2011) (VECOS)
      Verification and Evaluation of Computer and Communication Systems (VECoS 2011)
      15-16 September 2011
      iterative approach, observability, intransitive non-interference, INI, security, purge function, infimal
      Bookmark

            Abstract

            In this paper, we derive an iterative approach for the design of systems and protocols that are secure, with respect to intransitive non-interference (INI), a basic security property, assuring the non-devulgation of information through covert channels. Obviously, a system that does not satisfy INI, is, in some ways, not secure. Our iterative approach is composed of three steps : system design and modeling (1), INI verification (2), and INI satisfaction (3). The basic idea, is that a system’s designer during the first step of design, is focused on developing the core and necessary functionality, perhaps, while paying little attention to INI. Then, security of the system is verified, and if INI is not satisfied, the system must be modified in order it to make it secure. These modifications must be carried out, in a minimal way, as to preserve, in as much as possible, its core behavior. Our approach uses formulas for computing the minimal superlangage satisfying the INI property. We also investigate the implementation of these formulas based on automata models. Our approach can be applied to all systems and protocols with a three level security lattice, typically, sufficient for systems using cryptographic protocols. We also give a case study that illustrates our approach applicability to to cryptographic protocols and systems.

            Content

            Author and article information

            Contributors
            Conference
            September 2011
            September 2011
            : 1-9
            Affiliations
            [0001]National School of Computer Sciences, University of Manouba, Tunisia
            [0002]Department of Electrical and Computer Engineering, Wayne State University, Detroit, MI 48202 USA, and

            School of Electronics and Information Engineering, Tongji University, Shanghai, China
            Article
            10.14236/ewic/VECOS2011.7
            dcd060c5-998f-4d65-a303-88dffa469c40
            © Achraf Ben Said et al. Published by BCS Learning and Development Ltd. Fifth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2011), Tunis, Tunisia

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Fifth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2011)
            VECOS
            5
            Tunis, Tunisia
            15-16 September 2011
            Electronic Workshops in Computing (eWiC)
            Verification and Evaluation of Computer and Communication Systems (VECoS 2011)
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/VECOS2011.7
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            iterative approach,intransitive non-interference,purge function,INI,security,infimal,observability

            Comments

            Comment on this article