On Verification of Implementation of Security Specification with Petri Nets' Protocol Inheritance

被引:0
|
作者
Tang, Wenshan [1 ]
Gou, Zhaolong [1 ]
Bin Ahmadon, Mohd Anuaruddin [1 ]
Yamaguchi, Shingo [1 ]
机构
[1] Yamaguchi Univ, Grad Sch Sci & Engn, 2-16-1 Tokiwadai, Ube, Yamaguchi 7558611, Japan
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper, we tackled a problem: Given a security specification and its implementation, does the implementation satisfy the security specification? We first formalized the problem in terms of Petri nets. Next, we gave a polynomial time procedure to solve the problem based on Petri nets' analysis technique. Then we illustrated the procedure with an example to show the effectiveness.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A PROTOCOL MODELING AND VERIFICATION APPROACH BASED ON A SPECIFICATION LANGUAGE AND PETRI NETS
    SUZUKI, T
    SHATZ, SM
    MURATA, T
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (05) : 523 - 536
  • [2] Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
    Huang, Hejiao
    Kirchner, Helene
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 852 - 865
  • [3] FORMULAS, PROCESSES, AND PETRI-NETS APPLIED TO THE SPECIFICATION AND VERIFICATION OF A HDLC PROTOCOL
    ANTON, MD
    BRETSCHNEIDER, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1989, 352 : 140 - 154
  • [4] Use of expanded Petri nets for protocol specification
    Golovin, Yu.A.
    Matveeva, V.A.
    Automatic Control and Computer Sciences, 1988, 22 (06) : 10 - 16
  • [5] AUTOMATED PROTOCOL MODELING AND VERIFICATION COMBINING AN ENTITY-BASED SPECIFICATION LANGUAGE AND PETRI NETS
    SHATZ, SM
    SUZUKI, T
    MURATA, T
    PROCEEDINGS : THE THIRTEENTH ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE, 1989, : 580 - 587
  • [6] Analysis of Security Protocol Based on Petri Nets
    Liu, Fengli
    Han, Wei
    Jiang, Mingyue
    2011 AASRI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRY APPLICATION (AASRI-AIIA 2011), VOL 2, 2011, : 48 - 51
  • [7] SPECIFICATION AND VERIFICATION OF CACHE COHERENCE PROTOCOLS USING PETRI NETS
    AHMAD, I
    SALEH, K
    INTERNATIONAL JOURNAL OF ELECTRONICS, 1995, 78 (05) : 841 - 854
  • [8] Security protocol specification and verification with AnBx
    Bugliesi, Michele
    Calzavara, Stefano
    Modersheim, Sebastian
    Modesti, Paolo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 30 : 46 - 63
  • [9] Petri net-based verification of security protocol implementation in software evolution
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    Gupta, B. B.
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2018, 10 (06) : 503 - 517
  • [10] Application of colored petri nets in security protocol analysis
    Zhang, Jialin
    Miao, Xianghua
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ALGORITHMS, SOFTWARE ENGINEERING, AND NETWORK SECURITY, ASENS 2024, 2024, : 676 - 682