Skip to main content
Log in

Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies

  • Expert's Voice
  • Published:
Software & Systems Modeling Aims and scope Submit manuscript

Abstract

STAIRS is a formal approach to system development with UML 2.1 sequence diagrams that supports an incremental and modular development process. STAIRS is underpinned by denotational and operational semantics that have been proved to be equivalent. STAIRS is more expressive than most approaches with a formal notion of refinement. STAIRS supports a stepwise refinement process under which trace properties as well as trace-set properties are preserved. This paper demonstrates the potential of STAIRS in this respect, in particular that refinement in STAIRS preserves adherence to information flow properties as well as policies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aagedal, J.O., Milošević, Z.: ODP enterprise language: UML perspective. In: Proceedings of the 3rd International Conference on Enterprise Distributed Object Computing (EDOC’99), pp. 60–71. IEEE Computer Society (1999)

  2. Alpern B., Schneider F.B.: Defining liveness. Inform. Process. Lett. 21(4), 181–185 (1985)

    Article  MATH  MathSciNet  Google Scholar 

  3. Broy M.: A semantic and methodological essence of message sequence charts. Sci. Computer Program. 54(2–3), 213–256 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  4. Broy, M., Stølen, K.: Specification and development of interactive systems. FOCUS on Streams, Interface, and Refinement. Springer, Berlin (2001)

  5. Damm W., Harel D.: LSCs: Breathing life into message sequence charts. Formal Methods Syst. Des. 19(1), 45–80 (2001)

    Article  MATH  Google Scholar 

  6. Grosu, R., Smolka, S.A.: Safety-liveness semantics for UML 2.0 sequence diagrams. In: Proceedings of Applications of Concurrency to System Design (ACSD’05), pp. 6–14. IEEE Computer Society (2005)

  7. Harel D., Maoz S.: Assert and negate revisited: modal semantics for UML sequence diagrams. Softw. Syst. Model. 7(2), 237–252 (2008)

    Article  Google Scholar 

  8. Harel, D., Marelly, R.: Come, Let’s Play: Scenario-Based Programming Using LSCs and the Play-Engine. Springer, Berlin (2003)

  9. Haugen O., Husa K.E., Runde R.K., Stølen K.: STAIRS towards formal design with sequence diagrams. Softw. Syst. Model. 4, 355–367 (2005)

    Article  Google Scholar 

  10. Haugen, O., Husa, K.E., Runde, R.K., Stølen, K.: Why timed sequence diagrams require three-event semantics. In: Scenarios: models, transformations and tools, vol. 3466 of LNCS, pp. 1–25. Springer, Berlin (2005)

  11. Hoare, C.A.R.: Communicating Sequential Processes. Series in computer science. Prentice-Hall, Englewood Cliffs, NJ (1985)

  12. International Telecommunication Union. Recommendation Z.120 Annex B—Semantics of Message Sequence Chart (MSC) (1998)

  13. International Telecommunication Union. Recommendation Z.120—Message Sequence Chart (MSC) (2004)

  14. ISO/IEC. FCD 15414, Information Technology—Open Distributed Processing—Reference Model—Enterprise Viewpoint (2000)

  15. Jacob, J.: On the derivation of secure components. In: Proceedings of the IEEE Symposium on Security and Privacy (SP’89), pp. 242–247. IEEE Computer Society (1989)

  16. Jürjens, J.: Secrecy-preserving refinement. In: Proceedings of Formal Methods Europe (FME’01), vol. 2021 of LNCS, pp. 135–152. Springer, Berlin (2001)

  17. Kagal, L., Finin, T., Joshi, A.: A policy language for a pervasive computing environment. In: Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY’03), pp. 63–74. IEEE Computer Society (2003)

  18. Katoen, J.-P., Lambert, L.: Pomsets for message sequence charts. In: Formale Beschreibungstechniken für verteilte Systeme, pp. 197–208. Shaker, Germany (1998)

  19. Krüger, I.H.: Distributed System Design with Message Sequence Charts. PhD thesis, Institut für Informatik, Ludwig-Maximilians-Universität München (2000)

  20. Lund, M.S.: Operational analysis of sequence diagram specifications. PhD thesis, University of Oslo (2008)

  21. Lund, M.S., Stølen, K.: A fully general operational semantics for UML 2.0 sequence diagrams with potential and mandatory choice. In: Proceedings of the 14th International Symposium on Formal Methods (FM’06), number 4085 in LNCS, pp. 380–395. Springer, Berlin (2006)

  22. Mantel, H.: Possibilistic definitions of security—an assembly kit. In: Proceedings of IEEE Compuer Security Foundations Workshop (CSFW’00), pp. 185–199. IEEE Computer Society (2000)

  23. Mauw, S., Reniers, M.A.: High-level message sequence charts. In: Proceedings of the 8th SDL Forum, pp. 291–306. Elsevier, Amsterdam (1997)

  24. Mauw S., Reniers M.A.: Operational semantics for MSC’96. Computer Netw. ISDN Syst. 31(17), 1785–1799 (1999)

    Google Scholar 

  25. McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 79–93. IEEE Computer Society (1994)

  26. McNamara, P.: Deontic logic. In: Gabbay, D.M., Woods, J. (eds) Logic and the Modalities in the Twentieth Century, vol. 7 of Handbook of the History of Logic, pp. 197–288. Elsevier, Amsterdam (2006)

  27. Object Management Group. Unified Modeling Language: Superstructure, version 2.1.1 (2007)

  28. O’Halloran, C.: A calculus of information flow. In: Proceedings of European Symposium on Research in Computer Security (ESORICS’90), pp. 147–159. AFCET (1990)

  29. Refsdal, A., Husa, K.E., Stølen, K.: Specification and refinement of soft real-time requirements using sequence diagrams. In: Proceedings of the 3rd International Conference on Formal Modelling and Analysis of Timed Systems (FORMATS’05), vol. 3829 of LNCS, pp. 32–48. Springer, Berlin (2005)

  30. Refsdal, A., Runde, R.K., Stølen, K.: Underspecification, inherent nondeterminism and probability in sequence diagrams. In: Proceedings of the 8th IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS’06), vol. 4037 of LNCS, pp, 138–155. Springer, Berlin (2006)

  31. Roscoe, A.: CSP and determinism in security modelling. In: Proceedings of IEEE Symposium on Security and Privacy (SP’95), pp. 114–127. IEEE Computer Society (1995)

  32. Runde, R.K., Haugen, O., Stølen, K.: How to transform UML neg into a useful construct. In: Proceedings of Norsk Informatikkonferanse, pp. 55–66. Tapir, Trondheim (2005)

  33. Runde R.K., Haugen O., Stølen K.: Refining UML interactions with underspecification and nondeterminism. Nordic J. Comput. 12(2), 157–188 (2005)

    MATH  MathSciNet  Google Scholar 

  34. Runde, R.K., Refsdal, A., Stølen, K.: Relating computer systems to sequence diagrams with underspecification, inherent nondeterminism and probabilistic choice. Part 1. Underspecification and inherent nondeterminism. Technical Report, vol. 346. Department of Informatics, University of Oslo (2007)

  35. Schneider F.B.: Enforceable security policies. ACM Trans. Inform. Syst. Security 3(1), 30–50 (2000)

    Article  Google Scholar 

  36. Sengupta B., Cleaveland R.: Triggered message sequence charts. IEEE Trans. Softw. Eng. 32(8), 587–607 (2006)

    Article  Google Scholar 

  37. Sloman M.: Policy driven management for distributed systems. Netw. Syst. Manage. 2(4), 333–360 (1994)

    Article  Google Scholar 

  38. Sloman M., Lupu E.: Security and management policy specification. IEEE Netw. 16(2), 10–19 (2002)

    Article  Google Scholar 

  39. Solhaug, B., Elgesem, D., Stølen, K.: Specifying policies using UML sequence diagrams – An evaluation based on a case study. In: Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’07), pp. 19–28. IEEE Computer Society (2007)

  40. Steen, M., Derrick, J.: Formalising ODP enterprise policies. In: Proceedings of the 3rd International Conference on Enterprise Distributed Object Computing (EDOC’99), pp. 84–93. IEEE Computer Society (1999)

  41. Störrle, H.: Trace semantics of interactions in UML 2.0. Technical Report TR 0403, University of Munich (2004)

  42. Uchitel, S., Brunet, G., Chechik, M.: Behaviour model synthesis from properties and scenarios. In: Proceedings of the 29th International Conference in Software Engineering (ISCE’07), pp. 34–43. IEEE Computer Society (2007)

  43. Wies, R.: Policy definition and classification: Aspects, criteria, and examples. In: Proceedings of the IFIP/IEEE International Workshop on Distributed Systems: Operation and Management (1994)

  44. Zakinthinos, A., Lee, E.S.: A general theory of security properties. In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 94–102. IEEE Computer Society (1997)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ketil Stølen.

Additional information

Communicated by Prof. Bernhard Rumpe.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Seehusen, F., Solhaug, B. & Stølen, K. Adherence preserving refinement of trace-set properties in STAIRS: exemplified for information flow properties and policies. Softw Syst Model 8, 45–65 (2009). https://doi.org/10.1007/s10270-008-0102-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10270-008-0102-3

Keywords

Navigation