Upload
rajamanickam-n
View
224
Download
1
Embed Size (px)
Citation preview
Implementing Real-Time Transactional SecurityProperty using Timed Edit Automata
N.Rajamanickam and R.Nadarajan
PSG College of TechnologyCoimbatore, India
Security Policy
If a computer system is regarded as a state transition system, thena security policy is a statement that partitions the states of thesystem in to
I set of authorized states
I set of unauthorized states
Security Policy
A secure system is a system that starts in one of authorized state,and cannot enter an unauthorized state
Security Policy
I General purpose security policies
I Application dependent and special purpose security policies
Properties enforced by Timed Edit Automata
I Security Properties
I Transactional Properties
I Real-Time Properties
Security Property
A security property is a security policy, which could be enforceableby any enforcement mechanism
Edit Automata
Edit automaton E is a four tuple (Q,A, q0, δ) where
Q - countably infinite set of states
A - set of actions
q0 - start state
δ : Q × A→ Q × (A ∪ {.}) is deterministic totaltransition function
Execution
A finite execution α is a finite sequence of timed actions(action,time pairs)
α = a1 : t1; a2 : t2; a3 : t3; . . . ; ai : ti ; . . . ; an : tn
An infinite execution σ is an infinite sequence of timed actions
σ = a1 : t1; a2 : t2; a3 : t3; . . .
Timed Edit Automata
Timed edit automaton is a six tuple (Q,A, q0,C , δ, I ) where
Q - countably infinite set of control locations
A - set of actions
q0 - start control location
C - set of real valued clocks
δ : A∪{null}×Q×B(C )×U → A∪{null}×Q×2C×Uis deterministic transition function
I : Q → B(C ) assigns clock constraints to controllocations
Transitions
I TE-Delay is for the transition between two actions, if thetimed edit automaton is in the same control location
I TE-Suppress-Insert suppresses the current action ai andinserts the new action b
I TE-Insert is a discrete transition without taking any inputaction
I TE-Suppress suppresses the current input action ai and insertsno input action
I TE-Null is a discrete transition without taking any inputaction and without emitting any output action
Operational SemanticsDiscrete Transitions
σ = ai : ti ;σ′ δ(ai , q, g , u) = (b, q′, r , u′) u ∈ g u ∈ I (q) u′ ∈ I (q′)
(σ, q, u)b−→ TE (σ′, q′, u′)
(TE-Suppress-Insert)
δ(null , q, g , u) = (c , q′, r , u′) u ∈ g u′ ∈ I (q′)
(σ, q, u)c−→ TE (σ, q′, u′)
(TE-Insert)
Operational SemanticsDiscrete Transitions
σ = ai : ti ;σ′ δ(ai , q, g , u) = (null , q′, r , u′) u ∈ g u ∈ I (q) u′ ∈ I (q′)
(σ, q, u)null−−→ TE (σ′, q′, u′)
(TE-Suppress)
δ(null , q, g , u) = (null , q′, r , u′) u ∈ g u′ ∈ I (q′)
(σ, q, u)null−−→ TE (σ, q′, u′)
(TE-Null)
Operational Semantics
Delay Transitions
u ∈ I (q) u + d ∈ I (q)
(σ, q, u) −→d
TE (σ, q, u + d)(TE-Delay)
Conclusion
I Real-time transactional security property is a combination ofsecurity property, real time property and transactional property
I Timed market policy can be implemented by using timed editautomaton
References I
R. Alur and D. Dill.
A theory of timed automata.Theoritical Computer Science, 1994.
N. A.Lynch, R. Segala, and F. Vaandrager.
Hybrid i/o automata.Information and Computation, pages 105–157, 2003.
J. Bengtsson and W. Yi.
Timed automata: Semantics, algorithms and tools.In Lectures on Concurrency and Petri nets. Springer, 2004.
M. Bishop.
Computer Security: Art and Science.Addison-Wesly, 2002.
M. Bishop and S. S. Venkatramanayya.
Introduction to computer Security.Pearson Education, 2006.
F. B.Schneider.
Enforceable security policies.ACM Transactions on Information and System Security, 2000.
S. Davidson, I. Lee, and V. Wolfie.
Timed atomic commitment.IEEE Transactions on Computers, 1989.
R. Gupta, J. Haritsa, K. Ramamritham, and S.Seshadri.
Commit processing in distributed real-time database systems.1996.
References II
J. R. Haritsa, K. Ramamritham, and R. Gupta.
The prompt real-time commit protocol.IEEE Transactions on Parallel and Distributed Systems, 1999.
D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager.
Timed i/o automata: A mathematical framework for modeling and analyzing real-time systems.2003.
D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager.
The theory of timed i/o automata.2004.
J. Ligatti, L. Bauer, and D. Walker.
More enforceable security policies.In Foundations of Computer Security Workshop, 2002.
J. Ligatti, L. Bauer, and D. Walker.
Edit automata: enforcement mechanism for run-time security policies.International Journal of Information Security, 2005.
J. Ligatti, L. Bauer, and D. Walker.
Run-time enforcement of nonsafety policies.ACM Transactions on Information and Systems Security, 2009.