首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Process Expression of Security Automaton
作者姓名:余万涛  胡光锐
作者单位:Dept. of Electronic Information Shanghai Jiaotong Univ.,Dept. of Electronic Information Shanghai Jiaotong Univ.,Shanghai 200240 China,Shanghai 200240 China
摘    要:Security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal methods it is difficult to verify if the system comply with any given security policies. A method was introduced to express security automata which specifying enforceable security policies as processes in an extended π-calculus. In this extended π-calculus, an exception termination process was introduced, called bad. Any input which violating a security automaton will correspond to a step of transformation of the process that specifying the security automaton to exception termination process. Our method shows that any security automata which specifying enforceable security policies would decide a process in the extended π-calculus.


Process Expression of Security Automaton
YU Wan-tao,HU Guang-rui,.Process Expression of Security Automaton[J].Journal of Shanghai Jiaotong university,2007,12(6):736-739.
Authors:YU Wan-tao  HU Guang-rui  
Abstract:Security is an essential aspect for mobile systems. Usually, mobile system modeling and its security policies specification are realized in different techniques. So when constructed a mobile system using formal methods it is difficult to verify if the system comply with any given security policies. A method was introduced to express security automata which specifying enforceable security policies as processes in an extended π-calculus. In this extended π-calculus, an exception termination process was introduced, called bad. Any input which violating a security automaton will correspond to a step of transformation of the process that specifying the security automaton to exception termination process. Our method shows that any security automata which specifying enforceable security policies would decide a process in the extended π-calculus.
Keywords:safety property  security policy  security automata
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号