Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows

Identifieur interne : 001450 ( Main/Exploration ); précédent : 001449; suivant : 001451

Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows

Auteurs : Clara Bertolissi [France, Italie] ; Silvio Ranise [Italie]

Source :

RBID : ISTEX:E02E73F87B5B8A6A8C9437967CF2C5C05D3F730D

Abstract

Abstract: We introduce a class of symbolic transition systems capable of representing collections of security-aware workflows and we study the verification of reachability properties of such systems. More precisely, we define composed array-based systems as an extension of array-based systems in which array variables are indexed over more than one type. For an application relevant sub-class of these systems we show how to mechanize a symbolic backward reachability procedure by modularly re-using the techniques developed for array-based systems. Finally, and most importantly, we find sufficient conditions for the termination of the procedure and we apply this result to derive the decidability of the reachability problems of two important classes of security-aware workflow systems.

Url:
DOI: 10.1007/978-3-642-40885-4_4


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows</title>
<author>
<name sortKey="Bertolissi, Clara" sort="Bertolissi, Clara" uniqKey="Bertolissi C" first="Clara" last="Bertolissi">Clara Bertolissi</name>
</author>
<author>
<name sortKey="Ranise, Silvio" sort="Ranise, Silvio" uniqKey="Ranise S" first="Silvio" last="Ranise">Silvio Ranise</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:E02E73F87B5B8A6A8C9437967CF2C5C05D3F730D</idno>
<date when="2013" year="2013">2013</date>
<idno type="doi">10.1007/978-3-642-40885-4_4</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-7F147WNM-4/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">003543</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">003543</idno>
<idno type="wicri:Area/Istex/Curation">003501</idno>
<idno type="wicri:Area/Istex/Checkpoint">000076</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000076</idno>
<idno type="wicri:doubleKey">0302-9743:2013:Bertolissi C:verification:of:composed</idno>
<idno type="wicri:Area/Main/Merge">001462</idno>
<idno type="wicri:Area/Main/Curation">001450</idno>
<idno type="wicri:Area/Main/Exploration">001450</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows</title>
<author>
<name sortKey="Bertolissi, Clara" sort="Bertolissi, Clara" uniqKey="Bertolissi C" first="Clara" last="Bertolissi">Clara Bertolissi</name>
<affiliation wicri:level="3">
<country xml:lang="fr">France</country>
<wicri:regionArea>LIF-CNRS, UMR 7279 & AMU, Marseille</wicri:regionArea>
<placeName>
<region type="region">Provence-Alpes-Côte d'Azur</region>
<region type="old region">Provence-Alpes-Côte d'Azur</region>
<settlement type="city">Marseille</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country xml:lang="fr">Italie</country>
<wicri:regionArea>FBK (Fondazione Bruno Kessler), Trento</wicri:regionArea>
<wicri:noRegion>Trento</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Ranise, Silvio" sort="Ranise, Silvio" uniqKey="Ranise S" first="Silvio" last="Ranise">Silvio Ranise</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Italie</country>
<wicri:regionArea>FBK (Fondazione Bruno Kessler), Trento</wicri:regionArea>
<wicri:noRegion>Trento</wicri:noRegion>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We introduce a class of symbolic transition systems capable of representing collections of security-aware workflows and we study the verification of reachability properties of such systems. More precisely, we define composed array-based systems as an extension of array-based systems in which array variables are indexed over more than one type. For an application relevant sub-class of these systems we show how to mechanize a symbolic backward reachability procedure by modularly re-using the techniques developed for array-based systems. Finally, and most importantly, we find sufficient conditions for the termination of the procedure and we apply this result to derive the decidability of the reachability problems of two important classes of security-aware workflow systems.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>France</li>
<li>Italie</li>
</country>
<region>
<li>Provence-Alpes-Côte d'Azur</li>
</region>
<settlement>
<li>Marseille</li>
</settlement>
</list>
<tree>
<country name="France">
<region name="Provence-Alpes-Côte d'Azur">
<name sortKey="Bertolissi, Clara" sort="Bertolissi, Clara" uniqKey="Bertolissi C" first="Clara" last="Bertolissi">Clara Bertolissi</name>
</region>
</country>
<country name="Italie">
<noRegion>
<name sortKey="Bertolissi, Clara" sort="Bertolissi, Clara" uniqKey="Bertolissi C" first="Clara" last="Bertolissi">Clara Bertolissi</name>
</noRegion>
<name sortKey="Ranise, Silvio" sort="Ranise, Silvio" uniqKey="Ranise S" first="Silvio" last="Ranise">Silvio Ranise</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001450 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001450 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:E02E73F87B5B8A6A8C9437967CF2C5C05D3F730D
   |texte=   Verification of Composed Array-Based Systems with Applications to Security-Aware Workflows
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022