Filters








72,880 Hits in 2.6 sec

Action Refinement in Process Algebra and Security Issues [chapter]

Annalisa Bossi, Carla Piazza, Sabina Rossi
2008 Lecture Notes in Computer Science  
We study the relationships between action refinement and security properties within the Security Process Algebra (SPA).  ...  Finally, we consider information flow security properties for SPA processes and define a decidable class of secure processes which is closed under refinement.  ...  Conclusions and Related Works In this paper we study the relationships between action refinement and information flow security within the Security Process Algebra (SPA).  ... 
doi:10.1007/978-3-540-78769-3_14 fatcat:avn2iu3e4rdkbggdbf3mvqrvee

Relating multiset rewriting and process algebras for security protocol analysis

Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli, Roberto Gorrieri
2005 Journal of Computer Security  
In this paper, we examine the relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to CCS and the π-calculus.  ...  When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable.  ...  Section 2 recalls the multiset rewriting and process algebra frameworks and in Section 3 their use in the specification of security protocols.  ... 
doi:10.3233/jcs-2005-13102 fatcat:ssw2vdrcbvd27odcb43jjzmtfy

Process algebra and non-interference

P.Y.A. Ryan, S.A. Schneider
2001 Journal of Computer Security  
Casting these security concepts in a process algebraic framework clarifies the relationship between them and allows many results to be carried over regarding, for example, composition and unwinding.  ...  The information security community has long debated the exact definition of the term 'security'.  ...  Process algebra Process algebras provide a particular approach to the study of concurrency and interaction.  ... 
doi:10.3233/jcs-2001-91-204 fatcat:wzj5omhd5bc4pnsduxhyx4hq74

A Process Algebraic Approach to Security Policies [chapter]

Peter Ryan, Ragni Ryvold Arnesen
2003 IFIP Advances in Information and Communication Technology  
We argue that the properties of interest can be expressed cleanly in a mainstream formal method, in particular in the process algebra esp.  ...  We discuss the nature of security policies, particularly those that arise in the context of healthcare informatics, and the kind of mathematical framework needed to describe and reason about them.  ...  It has benefited from discussions with Latanya Sweeney and John Dobson.  ... 
doi:10.1007/978-0-387-35697-6_23 fatcat:semp53ussjdqfck7cvwq4434qa

Formalization of Viruses and Malware Through Process Algebras

Grégoire Jacob, Eric Filiol, Hervé Debar
2010 2010 International Conference on Availability, Reliability and Security  
In terms of expressiveness, the process-based model supports the fundamental notion of self-replication but also interactions, concurrency and nontermination to cover evolved malware.  ...  In terms of protection, detection undecidability and prevention by isolation still hold.  ...  Bonfante and J-Y. Marion for their help and working leads during the exploration of the process algebras.  ... 
doi:10.1109/ares.2010.59 dblp:conf/IEEEares/JacobFD10 fatcat:qwjpn2i5mnh4zarfw6bfk4nvui

Application of algebra and discrete wavelet transform in two-dimensional data (RGB-images) security

D. C. Mishra, R. K. Sharma
2014 International Journal of Wavelets, Multiresolution and Information Processing  
This method will have large potential usage in the digital RGB image processing and the security of image data.  ...  Security analysis, and detailed comparison between formerly developed techniques and proposed cryptosystem are also discussed for the robustness of the technique.  ...  But cryptanalysts try to break the security of data, and this process is known as hacking.  ... 
doi:10.1142/s0219691314500404 fatcat:3ugw6fouurhllamxz44fjhyc5y

Modeling and reconfiguration of critical business processes for the purpose of a Business Continuity Management respecting security, risk and compliance requirements at Credit Suisse using algebraic graph transformation

Christoph Brandt, Frank Hermann, Thomas Engel
2009 2009 13th Enterprise Distributed Object Computing Conference Workshops  
Because such a process has to respect certain laws, regulations and rules even in emergency situations, we sketch how this can be done during the process reconfiguration by looking at security, risk and  ...  In contrast to that, algebraic graph theory can be used as a formal method supporting employees when running business processes need to be reconfigured to recover from specific failures.  ...  This paper presents contributions in the area of business continuity management (BCM) with respect to security, risk and compliance and in the area of algebraic graph transformation (AGT).  ... 
doi:10.1109/edocw.2009.5332015 dblp:conf/edoc/BrandtHE09 fatcat:v3nj7lhtgzfyrfhcipxuykyd5i

Relating Multiset Rewriting and Process Algebras for Security Protocol Analysis

Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
2018
In this paper, we examine the relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to CCS and the -calculus.  ...  When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable.  ...  Section 2 recalls the multiset rewriting and process algebra frameworks and in Section 3 their use in the specification of security protocols.  ... 
doi:10.1184/r1/6608939.v1 fatcat:hvbuxtmjazcclbshih6u7gmlfa

Relating Process Algebras and Multiset Rewriting for Security Protocol Analysis

Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli
2018
In this paper, we examine the non-trivial relationship between two general verification frameworks: multiset rewriting (MSR) and a process algebra (PA) inspired to the CCS and the pi-calculus.  ...  When formalizing security protocols, different specification languages support very different reasoning methodologies, whose results are not directly or easily comparable.  ...  Section 2 recalls the multiset rewriting and process algebra frameworks and in Section 3 their use in security protocols specification.  ... 
doi:10.1184/r1/6608948 fatcat:7nfphdncsnhkvgj4gtiva42uby

Process algebra and non-interference

P.Y.A. Ryan, S.A. Schneider
Proceedings of the 12th IEEE Computer Security Foundations Workshop  
Casting these security concepts in a process algebraic framework clarifies the relationship between them and allows many results to be carried over regarding, for example, composition and unwinding.  ...  The information security community has long debated the exact definition of the term 'security'.  ...  Process algebra Process algebras provide a particular approach to the study of concurrency and interaction.  ... 
doi:10.1109/csfw.1999.779775 dblp:conf/csfw/RyanS99 fatcat:23py4bp25nah5an6lddrtynceq

Modeling and Reconfiguration of critical Business Processes for the purpose of a Business Continuity Management respecting Security, Risk and Compliance requirements at Credit Suisse using Algebraic Graph Transformation: Extended Version

Christoph Brandt, Frank Hermann, Jan Friso Groote, Technische Universität Berlin, Technische Universität Berlin
2020
Because such a process has to respect certain laws, regulations and rules even in emergency situations, we sketch how this can be done during the process reconfiguration by looking at security, risk and  ...  Furthermore, we show how the analysis can be extended to requirements concerning the information ow using the process algebra mCRL2.  ...  This paper presents contributions in the area of business continuity management (BCM) with respect to security, risk and compliance and in the area of algebraic graph transformation (AGT).  ... 
doi:10.14279/depositonce-10247 fatcat:dnxdqshd5fdcflpmuj4alb3ax4

An Algebraic Model of an Adaptive Extension of DiffServ for MANETs [chapter]

Osman Salem, Abdelmalek Benzekri
IFIP International Federation for Information Processing  
Then we present a formal model of our proposed extension using stochastic process algebras in order to verify the correctness and the efficiency of the proposed extension.  ...  In this paper, we propose an extension to DiffServ QoS architecture in order to enhance its performance and its flexibility when used in MANETs and its adaptation to the characteristics of these networks  ...  Markovian Process Algebra [14] ).  ... 
doi:10.1007/0-387-23198-6_17 dblp:conf/ifip6-2/SalemB04 fatcat:ux7i3is5lbfodpheb6v6zhxaie

Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods

Deng Hui, Liu Hui, Guo Ying, Zhang Baofeng
2015 Journal of Software  
It aims to transform the data exchange process and its security attribute of a program into algebraic systems which are able to be considered as objection functions and constraint conditions, respectively  ...  The information security problems caused by the software vulnerabilities have became more and more complex.  ...  Framework 1: Assume the algebraic systems corresponding to the data exchange process and its security attribute are M and N as follows, respectively.  ... 
doi:10.17706//jsw.10.9.1079-1085 fatcat:6sl5ix335vevvb542svebxo5a4

Memory Allocation Vulnerability Analysis and Analysis Optimization for C Programs Based on Formal Methods

Deng Hui, Liu Hui, Guo Ying, Zhang Baofeng
2015 Journal of Software  
It aims to transform the data exchange process and its security attribute of a program into algebraic systems which are able to be considered as objection functions and constraint conditions, respectively  ...  The information security problems caused by the software vulnerabilities have became more and more complex.  ...  Framework 1: Assume the algebraic systems corresponding to the data exchange process and its security attribute are M and N as follows, respectively.  ... 
doi:10.17706/jsw.10.9.1079-1085 fatcat:4cbpxne2dvgipgdwikgs3yrcb4

Algebraic State Machines: Concepts and Applications to Security [chapter]

Jan Jürjens
2004 Lecture Notes in Computer Science  
Each state is an algebra. Asynchronous communication through channels. Here: formal semantics of AlgSMs as stream-processing functions, composition, refinement, applications to security.  ...  Theorem: Composition and interpretation as stream-processing fn's are preserved by refinement. Similarly: timeless refinement (abstract from time steps before applying refinement).  ... 
doi:10.1007/978-3-540-39866-0_33 fatcat:x5rk4ftgcze35i4qzxlj4y2vae
« Previous Showing results 1 — 15 out of 72,880 results