Abstract
Formalism for analyses of biological systems specified by process algebras is proposed. Biologically motivated it combines several security notions and approaches. It allows us to formalize such properties of biological systems as diagnosability, detection ability and a presence of biological intruders and pathological changes. Resulting properties can be viewed as complementary to security ones. Moreover, these corresponding security properties are generalizations of several traditional ones and can detect security holes otherwise undetected.
Work supported by the grant VEGA 1/0688/10.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barbuti, R., Gruska, D.P., Maggiolo-Schettini, A., Milazzo, P.: A notion of biological diagnosability inspired by the notion of opacity in systems security. Fundamenta Informaticae 102(1), 19–34 (2010)
Bossi, A., Focardi, R., Piazza, C., Rossi, S.: Refinement Operators and Information Flow Security. In: Proc. of SEFM 2003. IEEE Computer Society Press (2003)
Bryans, J., Koutny, M., Ryan, P.: Modelling non-deducibility using Petri Nets. In: Proc. of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models (WISP 2004) (2004)
Bryans, J., Koutny, M., Mazaré, L., Ryan, P.Y.A.: Opacity Generalised to Transition Systems. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2005. LNCS, vol. 3866, pp. 81–95. Springer, Heidelberg (2006)
Focardi, R., Gorrieri, R., Martinelli, F.: Real-Time information flow analysis. IEEE Journal on Selected Areas in Communications 21 (2003)
Gorrieri, R., Martinelli, F., Matteucci, I.: Specification and Analysis of Information Flow Properties for Distributed Systems (2010) (submitted for publications)
Gruska, D.P., Maggiolo-Schettini, A.: Nested Timing Attacks. In: Proceedings of FAST 2003, Pisa, pp. 147–161 (2003)
Gruska, D.P.: Observation Based System Security. Fundamenta Informaticae 79(3-4), 335–346 (2007)
Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proc. of IEEE Symposium on Security and Privacy (1982)
Milner, R.: Communication and concurrency. Prentice-Hall International, New York (1989)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gruska, D.P. (2012). Diagnosability of Nested Intruders. In: Suzuki, J., Nakano, T. (eds) Bio-Inspired Models of Network, Information, and Computing Systems. BIONETICS 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 87. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32615-8_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-32615-8_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32614-1
Online ISBN: 978-3-642-32615-8
eBook Packages: Computer ScienceComputer Science (R0)