Skip to main content

Specification and analysis of a security management system

  • Conference paper
  • First Online:
FME '94: Industrial Benefit of Formal Methods (FME 1994)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 873))

Included in the following conference series:

Abstract

This paper presents the specification and the analysis of a security management system called SM and the modeling methodology used to obtain this specification. This security management system centrally manages and administers security for systems such as network elements (NE) (for example, telecommunication switches and data transport equipment), operating support systems (OSS), and other types of computerized systems. This paper also describes the objectives and the functions of the SM system, which include access control management, security standard management, and auditing. It then focuses on one of the critical components of the system, the download/upload controller. A specification of this component is presented using Milner's Calculus of Communicating Systems (CCS). This formal specification is then analyzed through simulation, process equivalence, and model-checking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bean, A., Wood, D. and Fairclough, W., “Specifying Goal-Oriented Network Management Systems”, IEEE Communication Magazine, May 1993.

    Google Scholar 

  2. Bolognesi, T. and Brinksma, H., “Introduction to the ISO specification language LOTOS”, Computer Networks and ISDN Systems, vol. 14, no.1, 1988, pp. 25–29.

    Google Scholar 

  3. Commission of the European Communities, “Information Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, 1991.

    Google Scholar 

  4. Cherkaoui, O., Rico, N. and Obaid, A., “Specification and Analysis of Two Call Processing Systems using CCS”, Technical Report, University du Québec à Montréal, Juin 1993.

    Google Scholar 

  5. Cherkaoui, O. and Rico, N., “Specification and Analysis of SONET Automatic Prrotection Switching”, Technical Report, Université du Québec à Montréal, Juin 1993.

    Google Scholar 

  6. Cleaveland, R., Parrow, J. and Steffen, B., “The Concurrency Workbench: A semantics-based verification tool for finite-state systems”, Proceedings of Workshop on Automated Verification

    Google Scholar 

  7. Cleaveland, R., “Tableau-based Model Checking in the Propositional Mu-Calculus”, University of Sussex Technical Report 2/89, March 1989.

    Google Scholar 

  8. Department of Defence, “Trusted Computer Security Evaluation Criteria”, DOD 5200.28-STD, Dec. 1985.

    Google Scholar 

  9. Emerson, E., Srinivasan, J., “Branching time temporal logic”, in Springer Verlag LNCS 354, 1989.

    Google Scholar 

  10. ESTELLE: A formal description technique based on extended finite state machine, 1987.

    Google Scholar 

  11. Kozen, D., “Results on the Propositional μ-calculus”, Theoretical Computer, 27, pp. 333–354, 1983.

    Google Scholar 

  12. Milner, R., “A Calculus of Communicating Systems”, LNCS 92, Springer Verlag, 1980, 171p.

    Google Scholar 

  13. Murata, T. and Zhang, D., “A Predicate-Transition Net Model for Parallel Interpretation of Logic Programs”, IEEE Trans, on Software Engineering, vol. 14, no.4, April 1988.

    Google Scholar 

  14. Hoare, C.A.R, “Communicating Sequential Processes”, Prentice Hall, New York, 1985.

    Google Scholar 

  15. LOTOS: A formal description technique based on the temporal ordering of observational behavior, ISO DP 8807 (1988).

    Google Scholar 

  16. Manna, Z. and Pnueli, A., “The temporal logic of reactive and concurrent systems specification”, Springer Verlag, N.-Y., 1992.

    Google Scholar 

  17. Parrow, J., “Submodule construction as Equation Solving in CCS”, In Proceedings of the foundation of Software Technology and Theoretical Computer Science, LNCS 287, pp. 103–123, 1987.

    Google Scholar 

  18. Shields, M.W., “Implicit System Specification and the Interface Equation”, The Computer Journal, vol.32, no.5, 1989.

    Google Scholar 

  19. Stallings, W., “A Network Security Primer”, Computerworld, vol. XXIV, no.5, January 1990.

    Google Scholar 

  20. Stirling, C. and Walker, D., “Local model-checking in the modal μ-calculus”, Theorical Computer Science, 89,pp. 161–177, 1991.

    Google Scholar 

  21. Walker D.J., “Analysis of Mutual Exclusion algorithms using CCS”, University of Edimburgh, Technical Report ECS-LFCS-88-45, 1988,.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Maurice Naftalin Tim Denvir Miquel Bertran

Rights and permissions

Reprints and permissions

Copyright information

© 1994 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cherkaoui, O., Rico, N., Bernardi, A. (1994). Specification and analysis of a security management system. In: Naftalin, M., Denvir, T., Bertran, M. (eds) FME '94: Industrial Benefit of Formal Methods. FME 1994. Lecture Notes in Computer Science, vol 873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58555-9_88

Download citation

  • DOI: https://doi.org/10.1007/3-540-58555-9_88

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-58555-8

  • Online ISBN: 978-3-540-49031-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics