Abstract
For large security systems a clear separation of concerns is achieved through architecting. Particularly the dynamic consistency between the architectural components should be addressed, in addition to individual component behaviour. In this paper, relevant dynamic consistency is specified through Paradigm, a coordination modeling language based on dynamic constraints. As it is argued, this fits well with security issues. A smaller example introduces the architectural approach towards implementing security policies. A larger casestudy illustrates the use of Paradigm in analyzing the FOO voting scheme. In addition, translating the Paradigm models into process algebra brings model checking within reach. Security properties of the examples discussed, are formally verified with the model checker mCRL2.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ahmed, T., Tripahti, A.R.: Specification and verification of security requirements in a programming model for decentralized CSCW systems. Transactions on Information and Systems Security 10, Article 7 (2007)
Anderson, R.: A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2001)
Andova, S., Groenewegen, L., de Vink, E.: System evolution by migration coordination. In: Serebrenik, A. (ed.) Proc. BENEVOL 2008, pp. 18–21. Technische Universiteit Eindhoven, Eindhoven (2008)
Andova, S., Groenewegen, L.P.J., de Vink, E.P.: Dynamic consistency in process algebra: From Paradigm to ACP. In: Canal, C., Poizat, P., Sirjani, M. (eds.) Proc. FOCLASA 2008. ENTCS, p. 19 (2008) (extended version submitted) (to appear)
Andova, S., Groenewegen, L.P.J., de Vink, E.P.: Formalizing adaptation on-the-fly. In: Salaün, G., Sirjani, M. (eds.) Proc. FOCLASA 2009. ENTCS (to appear, 2009)
Basin, D., Doser, J., Lodderstedt, T.: Model driven security: UML models to access control infrastructures. Transactions on Software Engineering and Methodology 15, 39–91 (2006)
Basin, D.A., Mödersheim, S., Viganò, L.: OFMC: A symbolic model checker for security protocols. Journal of Information Security 4, 181–208 (2005)
Bhargava, M., Palamidessi, C.: Probabilistic anonymity. In: Abadi, M., de Alfaro, L. (eds.) CONCUR 2005. LNCS, vol. 3653, pp. 171–185. Springer, Heidelberg (2005)
Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proc. CSFW, Cape Breton, pp. 82–96. IEEE, Los Alamitos (2001)
Braghin, C., Gorla, D., Sassone, V.: Role-based access control for a distributed calculus. Journal of Computer Security 14, 113–155 (2006)
Bravetti, M., Busi, N., Gorrieri, R., Lucchi, R., Zavattaro, G.: Security issues in the tuple-space coordination model. In: Dimitrakos, T., Martinelli, F. (eds.) Proc. FAST 2004, p. 13. Kluwer, Dordrecht (2005)
Cremers, C.J.F.: Scyther: Semantics and Verification of Security Protocols. PhD thesis, Technische Universiteit Eindhoven (2006)
van Eijck, J., Orzan, S.: Epistemic verification of anonymity. In: ter Beek, M., Cadducci, F. (eds.) Proc. VODCA 2006. ENTCS, vol. 168, pp. 159–174 (2007)
Fujioka, A., Okamoto, T.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244–251. Springer, Heidelberg (1993)
Garcia, F.D., Hasuo, I., Pieters, W., van Rossum, P.: Provable anonymity. In: Atluri, V., Samarati, P., Küsters, R., Mitchell, J.C. (eds.) Proc. FMSE, Fairfax, pp. 63–72. ACM, New York (2005)
Garlan, D.: Software architecture: a roadmap. In: Proc. ICSE 2000, Limerick, pp. 91–101. ACM, New York (2000)
Groenewegen, L., de Vink, E.P.: Operational semantics for coordination in Paradigm. In: Arbab, F., Talcott, C. (eds.) COORDINATION 2002. LNCS, vol. 2315, pp. 191–206. Springer, Heidelberg (2002)
Groenewegen, L., de Vink, E.: Evolution on-the-fly with Paradigm. In: Ciancarini, P., Wiklicky, H. (eds.) COORDINATION 2006. LNCS, vol. 4038, pp. 97–112. Springer, Heidelberg (2006)
Groenewegen, L.P.J., Stam, A.W., Toussaint, P.J., de Vink, E.P.: Paradigm as organization-oriented coordination language. In: van de Torre, L., Boella, G. (eds.) Proc. CoOrg 2005. ENTCS, vol. 150(3), pp. 93–113 (2005)
Groenewegen, L.P.J., de Vink, E.P.: Dynamic system adaptation by constraint orchestration. Technical Report CSR 08/29, Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, p.20, arXiv:0811.3492v1 (2008)
Groote, J.F., Mathijssen, A.H.J., Reniers, M.A., Usenko, Y.S., van Weerdenburg, M.J.: The formal specification language mCRL2. In: Brinksma, E., Harel, D., Mader, A., Stevens, P., Wieringa, R. (eds.) Methods for Modelling Software Systems, IBFI, Schloss Dagstuhl, 34 pages (2007)
Groote, J.F., Reniers, M.A.: Algebraic process verification. In: Bergstra, J.A., Ponse, A., Smolka, S.A. (eds.) Handbook of Process Algebra, pp. 1151–1208. Elsevier, Amsterdam (2001)
Groote, J.F., Willemse, T.: Parameterised boolean equation systems. Theoretical Computer Science 343, 332–369 (2005)
Kramer, J., Magee, J., Uchitel, S.: Software architecture modeling & analysis: A rigorous approach. In: Bernardo, M., Inverardi, P. (eds.) SFM 2003. LNCS, vol. 2804, pp. 44–51. Springer, Heidelberg (2003)
Kremer, S., Ryan, M.: Analysis of an electronic voting protocol in the applied Pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186–200. Springer, Heidelberg (2005)
Krukow, K., Nielsen, M., Sassone, V.: A logical framework for history-based access control and reputation systems. Journal of Computer Security 16, 63–101 (2008)
Küster, J.: Consistency Management of Object-Oriented Behavioral Models. PhD thesis, University of Paderborn (2004)
Lankhorst, M. (ed.): Enterprise Architecture at Work: Modelling, Communication and Analysis. Springer, Heidelberg (2005)
Lomuscio, A., Raimondi, F.: MCMAS: A model checker for multi-agent systems. In: Hermanns, H., Palsberg, J. (eds.) Proc. TACAS. LNCS, vol. 3920, pp. 450–454. Springer, Heidelberg (2006)
Lopes, A., Wermelinger, M., Fiadeiro, J.L.: Higher-order architectural connectors. Transactions on Software Engineering and Methodology 12, 64–104 (2003)
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055. Springer, Heidelberg (1996)
Mauw, S., Verschuren, J., de Vink, E.P.: Data anonymity in the FOO voting scheme. In: ter Beek, M., Gadducci, F. (eds.) Proc. VODCA 2006. ENTCS, vol. 168, pp. 5–28 (2007)
Mauw, S., Verschuren, J., de Vink, E.P.: A formalization of anonymity and onion routing. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 109–124. Springer, Heidelberg (2004)
Mauw, S., Verschuren, J., de Vink, E.P.: Data anonymity in the FOO voting scheme. In: ter Beek, M., Gadducci, F. (eds.) Proc. VODCA 2006. ENTCS, vol. 168, pp. 5–28 (2007)
van der Meyden, R., Su, K.: Symbolic model checking the knowledge of the dining cryptographers. In: Proc. CSFW, Pacific Grove, pp. 280–291. IEEE, Los Alamitos (2004)
Millen, J.K., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: Proc. CCS, Philadelphia, pp. 166–175. ACM, New York (2001)
Omicini, A.: Towards a notion of agent coordination context. In: Marinescu, D.C., Lee, C. (eds.) Process Coordination and Ubiquitous Computing, ch. 12, pp. 187–200. CRC Press, Boca Raton (2002)
Schneider, S., Sidiropoulos, A.: CSP and anonymity. In: Bertino, E., Kurth, H., Martella, G., Montolivo, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 198–218. Springer, Heidelberg (1996)
Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 41–53. Springer, Heidelberg (2003)
Shmatikov, V.: Probabilistic analysis of an anonymity system. Journal of Computer Security 12, 355–377 (2004)
Shmatikov, V., Talcott, C.L.: Reputation-based trust management. Journal of Computer Security 13, 167–190 (2005)
Song, D.X., Berezin, S., Perrig, A.: Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9, 47–74 (2001)
Stam, A.W.: Interaction Protocols in Paradigm. PhD thesis, LIACS, Leiden University (Forthcoming) (2009)
Vitek, J., Bryce, C., Oriol, M.: Coordinating processes with secure spaces. Science of Computer Programming 46, 163–193 (2003)
Zhang, N., Ryan, M., Guelev, D.P.: Synthesising verified access control systems through model checking. Journal of Computer Security 16, 1–61 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Andova, S., Groenewegen, L.P.J., Verschuren, J.H.S., de Vink, E.P. (2009). Architecting Security with Paradigm. In: de Lemos, R., Fabre, JC., Gacek, C., Gadducci, F., ter Beek, M. (eds) Architecting Dependable Systems VI. Lecture Notes in Computer Science, vol 5835. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10248-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-10248-6_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-10247-9
Online ISBN: 978-3-642-10248-6
eBook Packages: Computer ScienceComputer Science (R0)