Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Transforming Processes to Check and Ensure Information Flow Security*

Identifieur interne : 008726 ( Main/Exploration ); précédent : 008725; suivant : 008727

Transforming Processes to Check and Ensure Information Flow Security*

Auteurs : Annalisa Bossi [France, Italie] ; Riccardo Focardi [France, Italie] ; Carla Piazza [France, Italie] ; Sabina Rossi [France, Italie]

Source :

RBID : ISTEX:7D40C214F3C75EF3975E6572466FD95F634D40CE

Abstract

Abstract: Persistent BNDC (P BNDC for short) is an information- flow securitypro perty for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. We propose a method for transforming an arbitrary process into a process satisfying P_BNDC and show that the transformation preserves the “low level” observational semantics for a large class of processes. We also study how to efficiently verify P_BNDC by exploiting a characterization of it through a suitable notion of weak bisimulation up to high level actions. We define a second transformation over processes which allows us to reduce the problem of checking P_BNDC to the problem of testing a weak bisimulation between two processes. This approach is particularly appealing as it allows us to perform the P_BNDC check using already existing tools at a low time complexity.

Url:
DOI: 10.1007/3-540-45719-4_19


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Transforming Processes to Check and Ensure Information Flow Security*</title>
<author>
<name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
</author>
<author>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
</author>
<author>
<name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
</author>
<author>
<name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:7D40C214F3C75EF3975E6572466FD95F634D40CE</idno>
<date when="2002" year="2002">2002</date>
<idno type="doi">10.1007/3-540-45719-4_19</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-10S9WMQZ-P/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001D21</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001D21</idno>
<idno type="wicri:Area/Istex/Curation">001D00</idno>
<idno type="wicri:Area/Istex/Checkpoint">001B62</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">001B62</idno>
<idno type="wicri:doubleKey">0302-9743:2002:Bossi A:transforming:processes:to</idno>
<idno type="wicri:Area/Main/Merge">008B82</idno>
<idno type="wicri:Area/Main/Curation">008726</idno>
<idno type="wicri:Area/Main/Exploration">008726</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Transforming Processes to Check and Ensure Information Flow Security
<hi rend="superscript">*</hi>
</title>
<author>
<name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
<affiliation wicri:level="1">
<country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<affiliation wicri:level="1">
<country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author>
<name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
<affiliation wicri:level="1">
<country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author>
<name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
<affiliation wicri:level="1">
<country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Italie</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Persistent BNDC (P BNDC for short) is an information- flow securitypro perty for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. We propose a method for transforming an arbitrary process into a process satisfying P_BNDC and show that the transformation preserves the “low level” observational semantics for a large class of processes. We also study how to efficiently verify P_BNDC by exploiting a characterization of it through a suitable notion of weak bisimulation up to high level actions. We define a second transformation over processes which allows us to reduce the problem of checking P_BNDC to the problem of testing a weak bisimulation between two processes. This approach is particularly appealing as it allows us to perform the P_BNDC check using already existing tools at a low time complexity.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>France</li>
<li>Italie</li>
</country>
</list>
<tree>
<country name="France">
<noRegion>
<name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
</noRegion>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
<name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
</country>
<country name="Italie">
<noRegion>
<name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
</noRegion>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
<name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 008726 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 008726 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:7D40C214F3C75EF3975E6572466FD95F634D40CE
   |texte=   Transforming Processes to Check and Ensure Information Flow Security*
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022