An Approach to Automated Verification of Multi-Level Security System Models

作者: Andrzej Stasiak , Zbigniew Zieliński

DOI: 10.1007/978-3-319-00945-2_34

关键词: Software verificationHypervisorSecurity policyIntelligent verificationSoftware engineeringVerificationVerification and validation of computer simulation modelsVirtual machineFunctional verificationComputer science

摘要: In the paper approach to multi-level security (MLS) system models verification is presented. work MlsML profile was developed with possibility of confidentiality or integrity on base Bell- LaPadula Biba models. The Bell-LaPadula and are formalized together scenarios that represent possible run-time instances. Properties policy model expressed as constrains in OCL language. feasibility proposed by applying it a non-trivial example demonstrated.

参考文章(18)
Adam Kozakiewicz, Anna Felkner, Janusz Furtak, Zbigniew Zieliński, Marek Brudka, Marek Małowidzki, Secure Workstation for Special Applications FTRA International Conference on Secure and Trust Computing, Data Management, and Application. pp. 174- 181 ,(2011) , 10.1007/978-3-642-22365-5_21
Z. Zieliński, J. Furtak, J. Chudzikiewicz, A. Stasiak, M. Brudka, Secured Workstation to Process the Data of Different Classification Levels Journal of telecommunications and information technology. pp. 5- 12 ,(2012)
Juha-Pekka Tolvanen, Steven Kelly, Domain-Specific Modeling: Enabling Full Code Generation ,(2008)
Jan Jürjens, UMLsec: Extending UML for Secure Systems Development Lecture Notes in Computer Science. pp. 412- 425 ,(2002) , 10.1007/3-540-45800-X_32
David Basin, Manuel Clavel, Jürgen Doser, Marina Egea, Automated analysis of security-design models Information and Software Technology. ,vol. 51, pp. 815- 831 ,(2009) , 10.1016/J.INFSOF.2008.05.011
Haralambos Mouratidis, Paolo Giorgini, Gordon Manson, When security meets software engineering: a case of modelling secure information systems Information Systems. ,vol. 30, pp. 609- 629 ,(2005) , 10.1016/J.IS.2004.06.002
Gail-Joon Ahn, M.E. Shin, Role-based authorization constraints specification using Object Constraint Language workshops on enabling technologies infrastracture for collaborative enterprises. pp. 157- 162 ,(2001) , 10.1109/ENABL.2001.953406
D.E. Bell, Looking back at the Bell-La Padula model annual computer security applications conference. pp. 337- 351 ,(2005) , 10.1109/CSAC.2005.37