Transforming Processes to Check and Ensure Information Flow Security*
Identifieur interne : 008726 ( Main/Exploration ); précédent : 008725; suivant : 008727Transforming Processes to Check and Ensure Information Flow Security*
Auteurs : Annalisa Bossi [France, Italie] ; Riccardo Focardi [France, Italie] ; Carla Piazza [France, Italie] ; Sabina Rossi [France, Italie]Source :
- Lecture Notes in Computer Science [ 0302-9743 ]
Abstract
Abstract: Persistent BNDC (P BNDC for short) is an information- flow securitypro perty for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. We propose a method for transforming an arbitrary process into a process satisfying P_BNDC and show that the transformation preserves the “low level” observational semantics for a large class of processes. We also study how to efficiently verify P_BNDC by exploiting a characterization of it through a suitable notion of weak bisimulation up to high level actions. We define a second transformation over processes which allows us to reduce the problem of checking P_BNDC to the problem of testing a weak bisimulation between two processes. This approach is particularly appealing as it allows us to perform the P_BNDC check using already existing tools at a low time complexity.
Url:
DOI: 10.1007/3-540-45719-4_19
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 001D21
- to stream Istex, to step Curation: 001D00
- to stream Istex, to step Checkpoint: 001B62
- to stream Main, to step Merge: 008B82
- to stream Main, to step Curation: 008726
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Transforming Processes to Check and Ensure Information Flow Security*</title>
<author><name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
</author>
<author><name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
</author>
<author><name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
</author>
<author><name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:7D40C214F3C75EF3975E6572466FD95F634D40CE</idno>
<date when="2002" year="2002">2002</date>
<idno type="doi">10.1007/3-540-45719-4_19</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-10S9WMQZ-P/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001D21</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001D21</idno>
<idno type="wicri:Area/Istex/Curation">001D00</idno>
<idno type="wicri:Area/Istex/Checkpoint">001B62</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">001B62</idno>
<idno type="wicri:doubleKey">0302-9743:2002:Bossi A:transforming:processes:to</idno>
<idno type="wicri:Area/Main/Merge">008B82</idno>
<idno type="wicri:Area/Main/Curation">008726</idno>
<idno type="wicri:Area/Main/Exploration">008726</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Transforming Processes to Check and Ensure Information Flow Security<hi rend="superscript">*</hi>
</title>
<author><name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
<affiliation wicri:level="1"><country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author><name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<affiliation wicri:level="1"><country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author><name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
<affiliation wicri:level="1"><country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Italie</country>
</affiliation>
</author>
<author><name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
<affiliation wicri:level="1"><country xml:lang="fr">France</country>
<wicri:regionArea>Dipartimento di Informatica, Universitá Ca’ Foscari di Venezia</wicri:regionArea>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
<wicri:noRegion>Universitá Ca’ Foscari di Venezia</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Italie</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: Persistent BNDC (P BNDC for short) is an information- flow securitypro perty for processes in dynamic contexts, i.e., contexts that can be reconfigured at runtime. We propose a method for transforming an arbitrary process into a process satisfying P_BNDC and show that the transformation preserves the “low level” observational semantics for a large class of processes. We also study how to efficiently verify P_BNDC by exploiting a characterization of it through a suitable notion of weak bisimulation up to high level actions. We define a second transformation over processes which allows us to reduce the problem of checking P_BNDC to the problem of testing a weak bisimulation between two processes. This approach is particularly appealing as it allows us to perform the P_BNDC check using already existing tools at a low time complexity.</div>
</front>
</TEI>
<affiliations><list><country><li>France</li>
<li>Italie</li>
</country>
</list>
<tree><country name="France"><noRegion><name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
</noRegion>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
<name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
</country>
<country name="Italie"><noRegion><name sortKey="Bossi, Annalisa" sort="Bossi, Annalisa" uniqKey="Bossi A" first="Annalisa" last="Bossi">Annalisa Bossi</name>
</noRegion>
<name sortKey="Focardi, Riccardo" sort="Focardi, Riccardo" uniqKey="Focardi R" first="Riccardo" last="Focardi">Riccardo Focardi</name>
<name sortKey="Piazza, Carla" sort="Piazza, Carla" uniqKey="Piazza C" first="Carla" last="Piazza">Carla Piazza</name>
<name sortKey="Rossi, Sabina" sort="Rossi, Sabina" uniqKey="Rossi S" first="Sabina" last="Rossi">Sabina Rossi</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 008726 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 008726 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:7D40C214F3C75EF3975E6572466FD95F634D40CE |texte= Transforming Processes to Check and Ensure Information Flow Security* }}
This area was generated with Dilib version V0.6.33. |