Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2523514.2523578acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
poster

Implementing real-time transactional security property using timed edit automata

Published: 26 November 2013 Publication History

Abstract

Timed edit automaton is action sequence transformer which takes a sequence of actions as input and produces another sequence of actions according to the policy it implements. If the input action sequence obeys the policy then timed edit automaton produces same actions sequence or an equivalent action sequence. If the input action sequence does not obey the policy then the timed edit automaton produces modified action sequence. Timed edit automaton is suitable for implementing real-time transactional security property.

References

[1]
R. Alur and D. Dill. A theory of timed automata. Theoritical Computer Science, 1994.
[2]
N. A. Lynch, R. Segala, and F. Vaandrager. Hybrid i/o automata. Information and Computation, pages 105--157, 2003.
[3]
J. Bengtsson and W. Yi. Timed automata: Semantics, algorithms and tools. In Lectures on Concurrency and Petri nets. Springer, 2004.
[4]
M. Bishop. Computer Security: Art and Science. Addison-Wesly, 2002.
[5]
M. Bishop and S. S. Venkatramanayya. Introduction to computer Security. Pearson Education, 2006.
[6]
F. B. Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 2000.
[7]
S. Davidson, I. Lee, and V. Wolfie. Timed atomic commitment. IEEE Transactions on Computers, 1989.
[8]
R. Gupta, J. Haritsa, K. Ramamritham, and S. Seshadri. Commit processing in distributed real-time database systems. 1996.
[9]
J. R. Haritsa, K. Ramamritham, and R. Gupta. The prompt real-time commit protocol. IEEE Transactions on Parallel and Distributed Systems, 1999.
[10]
D. K. Kaynar, N. A. Lynch, R. Segala, and F. Vaandrager. Timed i/o automata: A mathematical framework for modeling and analyzing real-time systems. 2003.
[11]
D. K. Kaynar, N. A. Lynch, R. Segala, and F. Vaandrager. The theory of timed i/o automata. 2004.
[12]
J. Ligatti, L. Bauer, and D. Walker. More enforceable security policies. In Foundations of Computer Security Workshop, 2002.
[13]
J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanism for run-time security policies. International Journal of Information Security, 2005.
[14]
J. Ligatti, L. Bauer, and D. Walker. Run-time enforcement of nonsafety policies. ACM Transactions on Information and Systems Security, 2009.

Cited By

View all
  • (2015)Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-Verifier for Digital Goods ProvidersComputational Intelligence, Cyber Security and Computational Models10.1007/978-981-10-0251-9_35(369-384)Online publication date: 19-Dec-2015
  • (2014)Formal Verification of Finite State Transactional Security PolicyNetwork and System Security10.1007/978-3-319-11698-3_28(363-376)Online publication date: 2014

Index Terms

  1. Implementing real-time transactional security property using timed edit automata

                            Recommendations

                            Comments

                            Information & Contributors

                            Information

                            Published In

                            cover image ACM Other conferences
                            SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
                            November 2013
                            483 pages
                            ISBN:9781450324984
                            DOI:10.1145/2523514
                            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                            Sponsors

                            • Macquarie U., Austarlia
                            • MNIT: Malaviya National Institute of Technology
                            • Aksaray Univ.: Aksaray University
                            • SFedU: Southern Federal University

                            In-Cooperation

                            Publisher

                            Association for Computing Machinery

                            New York, NY, United States

                            Publication History

                            Published: 26 November 2013

                            Check for updates

                            Author Tags

                            1. edit automata
                            2. real-time properties
                            3. security properties
                            4. timed automata
                            5. transactional properties

                            Qualifiers

                            • Poster

                            Conference

                            SIN '13
                            Sponsor:
                            • MNIT
                            • Aksaray Univ.
                            • SFedU

                            Acceptance Rates

                            Overall Acceptance Rate 102 of 289 submissions, 35%

                            Contributors

                            Other Metrics

                            Bibliometrics & Citations

                            Bibliometrics

                            Article Metrics

                            • Downloads (Last 12 months)0
                            • Downloads (Last 6 weeks)0
                            Reflects downloads up to 09 Nov 2024

                            Other Metrics

                            Citations

                            Cited By

                            View all
                            • (2015)Hash Based Two Gateway Payment Protocol Ensuring Accountability with Dynamic ID-Verifier for Digital Goods ProvidersComputational Intelligence, Cyber Security and Computational Models10.1007/978-981-10-0251-9_35(369-384)Online publication date: 19-Dec-2015
                            • (2014)Formal Verification of Finite State Transactional Security PolicyNetwork and System Security10.1007/978-3-319-11698-3_28(363-376)Online publication date: 2014

                            View Options

                            Get Access

                            Login options

                            View options

                            PDF

                            View or Download as a PDF file.

                            PDF

                            eReader

                            View online with eReader.

                            eReader

                            Media

                            Figures

                            Other

                            Tables

                            Share

                            Share

                            Share this Publication link

                            Share on social media