skip to main content
10.1145/1146269.1146293acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Visual security protocol modeling

Published:20 September 2005Publication History

ABSTRACT

This paper argues that the existing model-driven architecture paradigm does not adequately cover the visual modeling of security protocols: sequences of interactions between principals. A security protocol modeling formalism should be not only well-defined but also support event-based, compositional, comprehensive, laconic, lucid, sound, and complete modeling. Candidate visual approaches from both the OMG's MDA and other more well-defined formalisms fail to satisfy one or more of these criteria. By means of two example security protocol models, we present the GSPML visual formalism as a solution.

References

  1. J. Baeten and W. Weijland. Process Algebra. Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Basin, J. Doser, and T. Lodderstedt. Model driven security for process-oriented systems. In Proc. Eighth ACM Symposium on Access Control Models and Technologies, Como, Italy, June 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Bergstra and J. Klop. Fixed point semantics in process algebra. Technical report, Mathematical Centre, Amsterdam, 1982.]]Google ScholarGoogle Scholar
  4. S. Brackin. A HOL extension of GNY for automatically analyzing cryptographic protocols. In Proc. 9th IEEE Computer Security Foundations Workshop, Kenmare, County Kerry, Ireland, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London, (426):233--271, 1989.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. Cerone. From process algebra to visual language. Technical Report 01--36, Software Verification Research Centre, The University of Queensland, Queensland 4072, Australia, October 2001.]]Google ScholarGoogle Scholar
  7. I. Cervesato and C. Meadows. A fault-tree representation of NPATRL security requirements. In Workshop on Issues in Theory of Security 2003, 2003.]]Google ScholarGoogle ScholarCross RefCross Ref
  8. R. Cleaveland, X. Du, and S. Smolka. GCCS: A graphical coordination language for system specification. In 4th International Conference on Coordination Models and Languages, pages 284--298, Limassol, Cyprus, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Cleaveland, J. Gada, P. Lewis, S. Smolka, O. Sokolsky, and S. Zhang. The Concurrency Factory: practical tools for specification, simulation, verification and implementation of concurrent systems. In G. Belloch, K. Chandy, and S. Jagannathan, editors, Proc. DIMACS Workshop on Specification of Parallel Algorithms. AMS, May 1994.]]Google ScholarGoogle ScholarCross RefCross Ref
  10. W. Damm and D. Harel. LSCs: Breathing life into message sequence charts. Formal Methods in System Design, 19, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Epstein and R. Sandhu. Towards a UML based approach to role engineering. In Proc. Fourth ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, October 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F. Fabrega, J. Herzog, and J. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7:191--230, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Gilmore and M. Gribaudo. Graphical modelling of process algebras with DrawNET. In Proc. Workshop on Petri Nets and Performance Models (PNPM '03), Urbanna, Illinois, USA, September 2--5 2003.]]Google ScholarGoogle Scholar
  14. G. Guizzardi, L. Pires, and M. von Sinderen. An ontology-based approach for evaluating domain appropriateness and comprehensibility appropriateness of modeling languages. In 8th ACM/IEEE Int. Conf. on Model-Driven Engineering Languages and Systems, Montego Bay, Jamaica, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Gurr. Effective diagrammatic communication: Syntactic, semantic, and pragmatic issues. Journal of Visual Languages and Computing, 10, 1999.]]Google ScholarGoogle Scholar
  16. D. Harel. Statecharts: a visual formalism for complex systems. Science of Computer Programming, 8:231--274, 1987.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Harel and E. Gery. Executable object modeling with statecharts. IEEE Computer, 30(7), July 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Henderson, R. Walters, and S. Crouch. Implementing hierarchical features in a graphically based formal modelling language. In Proc. 28th Int. Computer Software and Applications Conf. COMPSAC '04, pages 92--98, Hong Kong, September 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. G. Hilderink. A graphical modeling language for specifying concurrency based on CSP. In Proc. Communicating Process Architectures 2002, Reading, England, September 2002.]]Google ScholarGoogle Scholar
  20. J. Hillston. A Compositional Approach to Performance Modelling. Cambridge University Press, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C. Hoare. Communicating Sequential Processes. Prentice-Hall International, 1985.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. D. Jovanovic, B. Orlic, G. Liet, and J. Broenink. gCSP: a graphical tool for designing CSP systems. In Proc. Communicating Process Architectures 2004, Headington, England, September 2004.]]Google ScholarGoogle Scholar
  23. J. Jürjens. UMLsec: extending uml for secure systems development. In Proc. UML 2002, Dresden, Germany, September 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. Landin. The next 700 programming languages. CACM, 9(3), 1966.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. R. Lichota, G. Hammonds, and S. Brackin. Verifying the correctness of cryptographic protocols using Convince. In Proc. 12th Annual Computer Security Applications Conference, San Diego, California, USA, December 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symposium on Research in Security and Privacy, Oakland, California, USA, May 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. Meadows. The NRL protocol analyzer: an overview. The Journal of Logic Programming, 26(2):113--131, 1996.]]Google ScholarGoogle ScholarCross RefCross Ref
  28. V. Mencl. Enhancing component behavior specifications with port state machines. Electronic Notes in Theoretical Computer Science, 101C:129--153, 2004. Special issue: Proceedings of the Workshop on the Compositional Verifications of UML Models, CVUML, Ed. F. de Boer and M. Bonsangue.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. Millen and G. Denker. CAPSL and MuCAPSL. Journal of Telecommunications and Information Technology, pages 16--27, March 2002.]]Google ScholarGoogle Scholar
  30. G. Milne. Formal Specification and Verification of Digital Systems. McGraw-Hill, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R. Milner. Communication and Concurrency. International Series in Computer Science. Prentice-Hall, 1989.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Object Management Group. Unified Modeling Language: Superstructure, Version 2.0, final adopted specification ptc/03-08-02 edition, August 2003.]]Google ScholarGoogle Scholar
  33. C. Petri. Kommunikation mit Automaten. PhD thesis, Bonn: Institut für Mathematik, 1962. Available as Technical Report RADC-TR-65-377, vol. 1, 1966, pages:supl. 1, English Translation.]]Google ScholarGoogle Scholar
  34. P. Ryan and S. Schneider. Process algebra and non-interference. In Proc. 12th IEEE Computer Security Foundations Workshop, Mordano, Italy, June 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. P. Ryan and S. Schneider. Modelling and Analysis of Security Protocols. Addison-Wesley, 2001.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. E. Saul and A. Hutchison. Enhanced security protocol engineering through a unified multidimensional framework. IEEE Journal on Selected Areas in Communications, 21(1), January 2003.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. Schneider. Verifying the correctness of authentication protocols in CSP. IEEE Transactions on Software Engineering, 24(9):741--758, September 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. B. Selic. The pragmatics of model-driven development. IEEE Software, pages 19--25, September/October 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. D. Song, S. Berezin, and A. Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9:47--74, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. J. Tenzer and P. Stevens. Modelling recursive calls with UML state diagrams. In Fundamental Approaches to Software Engineering 2003, LNCS 2621, pages 135--149, Warsaw, Poland, April 2003. Springer-Verlag.]]Google ScholarGoogle Scholar
  41. E. Tufte. The Visual Display of Quantitative Information. Graphics Press, Cheshire, Connecticut, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. R. Walters. Automating checking of models built using a graphically based formal modelling language. Journal of Systems and Software, 71(1):55--64, 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Visual security protocol modeling

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          NSPW '05: Proceedings of the 2005 workshop on New security paradigms
          September 2005
          133 pages
          ISBN:1595933174
          DOI:10.1145/1146269

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 20 September 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate62of170submissions,36%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader