The Application of Model Checking in Validating Information System Software Security

被引:0
|
作者
Liu Xin [1 ]
Cai Wandong [1 ]
机构
[1] Northwestern Polytech Univ, Xian, Peoples R China
关键词
software security; validation; model checking;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the effectiveness of model checking in validating information system software security, and give the formal definition for these two properties. A model checking based security policy validation and verification method is proposed to validate the consistency and completeness for security policy. This method can also be used to generate a validation sequence. Finally, we'll discuss our availability and reliability of validation methods:
引用
收藏
页码:448 / 451
页数:4
相关论文
共 50 条
  • [21] Experiences with the application of symbolic model checking to the analysis of software specifications
    Anderson, RJ
    Beame, P
    Chan, W
    Notkin, D
    PERSPECTIVES OF SYSTEM INFORMATICS, 2000, 1755 : 460 - 469
  • [22] Model Checking the Information Flow Security of Real-Time Systems
    Gerking, Christopher
    Schubert, David
    Bodden, Eric
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018, 2018, 10953 : 27 - 43
  • [23] The Application of Software Testing Technology on Security in Web Application System
    Zhai, Hui
    Shi, Hui
    Zhai, Rui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6159 - 6161
  • [24] Applying model checking to destructive testing and analysis of software system
    Kumamoto, Hiroki
    Mizuno, Takahisa
    Narita, Kensuke
    Nishizaki, Shin-ya
    Journal of Software, 2013, 8 (05) : 1254 - 1261
  • [25] Model Checking of Software Development in Distributed Animation Rendering System
    Hong, Zhiguo
    Wang, Yongbin
    Shi, Minyong
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1575 - 1579
  • [26] Models and software model checking of a distributed file replication system
    Bjorner, Nikolaj
    Formal Methods and Hybrid Real-Time Systems, 2007, 4700 : 1 - 23
  • [27] Research on information security model and security system design
    Huang, Yi-Min
    Ping, Ling-Di
    Pan, Xue-Zeng
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2001, 35 (06): : 603 - 607
  • [28] Model Checking of Software for Microcontrollers
    Schlich, Bastian
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2010, 9 (04)
  • [29] Model checking grid security
    Pagliarecci, F.
    Spalazzi, L.
    Spegni, F.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 811 - 827
  • [30] Software operation system information model
    Kobayashi, Toru
    Horikawa, Keitaro
    Ushida, Fumiaki
    Electronics and Communications in Japan, Part III: Fundamental Electronic Science (English translation of Denshi Tsushin Gakkai Ronbunshi), 1994, 77 (08): : 84 - 92