The Application of Model Checking in Validating Information System Software Security

被引:0
|
作者
Liu Xin [1 ]
Cai Wandong [1 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
关键词
software security; validation; model checking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the effectiveness of model checking in validating information system software security, and give the formal definition for these two properties. A model checking based security policy validation and verification method is proposed to validate the consistency and completeness for security policy. This method can also be used to generate a validation sequence. Finally, we'll discuss our availability and reliability of validation methods:
引用
收藏
页码:448 / 451
页数:4
相关论文
共 50 条
  • [1] Validating Software Reliability Early through Statistical Model Checking
    Kim, Youngjoo
    Choi, Okjoo
    Kim, Moonzoo
    Baik, Jongmoon
    Kim, Tai-Hyo
    IEEE SOFTWARE, 2013, 30 (03) : 35 - 41
  • [2] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [3] Application of model checking to AXML system's security: A case study
    Kim, Il-Gon
    Biswas, Debmalya
    WEB SERVICES AND FORMAL METHODS, PROCEEDINGS, 2006, 4184 : 242 - 256
  • [4] The Application of Software Engineering in Intelligent System Validating
    Feng Guiliang
    Liu Weidong
    Wang Shuhong
    SMART MATERIALS AND INTELLIGENT SYSTEMS, 2012, 442 : 418 - +
  • [5] Application of model checking in software requirements analysis
    Liu, Yuejun
    Su, Jing
    Metallurgical and Mining Industry, 2015, 7 (08): : 372 - 376
  • [6] Environment generation for validating event-driven software using model checking
    Tkachuk, O.
    Dwyer, M. B.
    IET SOFTWARE, 2010, 4 (03) : 194 - 209
  • [7] Model checking safety critical software with SPIN: An application to a railway interlocking system
    Cimatti, A
    Giunchiglia, F
    Mongardi, G
    Romano, D
    Torielli, F
    Traverso, P
    COMPUTER SAFETY, RELIABILITY AND SECURITY, 1998, 1516 : 284 - 295
  • [8] Software Model Checking for Mobile Security - Collusion Detection in K
    Asavoae, Irina Mariuca
    Hoang Nga Nguyen
    Roggenbach, Markus
    MODEL CHECKING SOFTWARE, SPIN 2018, 2018, 10869 : 3 - 25
  • [9] Validating and extending the unified model of information security policy compliance
    Gerdin, Marcus
    INFORMATION AND COMPUTER SECURITY, 2025, 33 (01) : 25 - 48
  • [10] An Application Security Model Based on Business Process in Information System
    Xu, Peng
    Chen, Meirong
    Feng, Lifang
    Wu, Guanfeng
    Ma, Fangli
    Wang, Danchen
    2017 12TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND KNOWLEDGE ENGINEERING (IEEE ISKE), 2017,