2010
DOI: 10.1002/stvr.441
|View full text |Cite
|
Sign up to set email alerts
|

A framework for automatic generation of security controller

Abstract: SUMMARYThis paper concerns the study, the development and the synthesis of mechanisms for guaranteeing the security of complex systems, i.e., systems composed by several interacting components.A complex system under analysis is described as an open system, i.e., a system in which an unspecified component (a component whose behaviour is not fixed in advance) interacts with the known part of the system. Within this formal approach, we propose techniques that aim to synthesize controller programs able to guarante… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 30 publications
(48 reference statements)
0
12
0
Order By: Relevance
“…In this paper, we do not yet investigate this aspect of the framework; this is left as future work. In particular, we plan to use quantitative evaluation of security policies, specified by logic formulas, in order to extend previous work on automated verification and synthesis of (qualitative) controllers [21].…”
Section: Discussion -Future Workmentioning
confidence: 99%
“…In this paper, we do not yet investigate this aspect of the framework; this is left as future work. In particular, we plan to use quantitative evaluation of security policies, specified by logic formulas, in order to extend previous work on automated verification and synthesis of (qualitative) controllers [21].…”
Section: Discussion -Future Workmentioning
confidence: 99%
“…We also aim to apply the action refinement theory to cryptographic protocols specified by using Crypto-CCS [17] and GN DC. We also would like to go further in this direction by dealing also with the synthesis of controller program Y as in [19].…”
Section: Discussionmentioning
confidence: 99%
“…Here we extend the definition of GNDC by introducing a controller program as parameter of the definition. A controller program is a process that, by monitoring the behaviour of a possible malicious component according to a strategy defined by a controller operator , guarantees that a considered system is secure [19]. Hence, at high level of abstraction we have the following formalization, given in terms of process algebra [9], for our family of properties:…”
Section: Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…There are numerous methods for business process assessment, that can be used to evaluate all business processes of the organization, e.g. RAPID RE [17]. Obtained values, after normalization, provide business processes weights WBP i .…”
Section: Integrated Approach To Information Security Monitoringmentioning
confidence: 99%