Loading…
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system bui...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 180 |
container_issue | |
container_start_page | 173 |
container_title | |
container_volume | |
creator | Mallouli, W. Mammar, A. Cavalli, A.R. |
description | Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework. |
doi_str_mv | 10.1109/DS-RT.2008.22 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4700118</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4700118</ieee_id><sourcerecordid>4700118</sourcerecordid><originalsourceid>FETCH-LOGICAL-h279t-b5af1d34eff30a2efc3dbb9e7833b11aaa01c1ae160fed5ea510055d2b29878b3</originalsourceid><addsrcrecordid>eNotjE9Lw0AUxBdUsNYePXnZL5D43m42f44S2yq0CE16Dpvsi1lpU8lu0Xx7U3QOMz8GZhh7QAgRIXt6KYJdGQqANBTiit1BEmdKRkKJazZDpSCIlVC3bOHcJ0ySWRQjzli1PRk62P6DF6PzdOQFNefB-pHvzgdy_Nv6jpf2SDw_9c4P2vbe8b27LC614csfT72ZYGV764kXXk--1U1ne3L37KbVB0eL_5yz_WpZ5q_B5n39lj9vgk4kmQ9qpVs0MqK2laAFtY00dZ1RkkpZI2qtARvUhDG0ZBRphQBKGVGLLE3SWs7Z49-vJaLqa7BHPYxVlAAgpvIXUahU1A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mallouli, W. ; Mammar, A. ; Cavalli, A.R.</creator><creatorcontrib>Mallouli, W. ; Mammar, A. ; Cavalli, A.R.</creatorcontrib><description>Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.</description><identifier>ISSN: 1550-6525</identifier><identifier>ISBN: 0769534252</identifier><identifier>ISBN: 9780769534251</identifier><identifier>DOI: 10.1109/DS-RT.2008.22</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automata ; Buildings ; Clocks ; Context ; Formal languages ; Real time systems ; Security ; Systems engineering and theory ; Telecommunications ; Time factors</subject><ispartof>2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008, p.173-180</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4700118$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4700118$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mallouli, W.</creatorcontrib><creatorcontrib>Mammar, A.</creatorcontrib><creatorcontrib>Cavalli, A.R.</creatorcontrib><title>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</title><title>2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications</title><addtitle>DISRTA</addtitle><description>Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.</description><subject>Automata</subject><subject>Buildings</subject><subject>Clocks</subject><subject>Context</subject><subject>Formal languages</subject><subject>Real time systems</subject><subject>Security</subject><subject>Systems engineering and theory</subject><subject>Telecommunications</subject><subject>Time factors</subject><issn>1550-6525</issn><isbn>0769534252</isbn><isbn>9780769534251</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjE9Lw0AUxBdUsNYePXnZL5D43m42f44S2yq0CE16Dpvsi1lpU8lu0Xx7U3QOMz8GZhh7QAgRIXt6KYJdGQqANBTiit1BEmdKRkKJazZDpSCIlVC3bOHcJ0ySWRQjzli1PRk62P6DF6PzdOQFNefB-pHvzgdy_Nv6jpf2SDw_9c4P2vbe8b27LC614csfT72ZYGV764kXXk--1U1ne3L37KbVB0eL_5yz_WpZ5q_B5n39lj9vgk4kmQ9qpVs0MqK2laAFtY00dZ1RkkpZI2qtARvUhDG0ZBRphQBKGVGLLE3SWs7Z49-vJaLqa7BHPYxVlAAgpvIXUahU1A</recordid><startdate>200810</startdate><enddate>200810</enddate><creator>Mallouli, W.</creator><creator>Mammar, A.</creator><creator>Cavalli, A.R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200810</creationdate><title>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</title><author>Mallouli, W. ; Mammar, A. ; Cavalli, A.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-h279t-b5af1d34eff30a2efc3dbb9e7833b11aaa01c1ae160fed5ea510055d2b29878b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Automata</topic><topic>Buildings</topic><topic>Clocks</topic><topic>Context</topic><topic>Formal languages</topic><topic>Real time systems</topic><topic>Security</topic><topic>Systems engineering and theory</topic><topic>Telecommunications</topic><topic>Time factors</topic><toplevel>online_resources</toplevel><creatorcontrib>Mallouli, W.</creatorcontrib><creatorcontrib>Mammar, A.</creatorcontrib><creatorcontrib>Cavalli, A.R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mallouli, W.</au><au>Mammar, A.</au><au>Cavalli, A.R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</atitle><btitle>2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications</btitle><stitle>DISRTA</stitle><date>2008-10</date><risdate>2008</risdate><spage>173</spage><epage>180</epage><pages>173-180</pages><issn>1550-6525</issn><isbn>0769534252</isbn><isbn>9780769534251</isbn><abstract>Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.</abstract><pub>IEEE</pub><doi>10.1109/DS-RT.2008.22</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1550-6525 |
ispartof | 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008, p.173-180 |
issn | 1550-6525 |
language | eng |
recordid | cdi_ieee_primary_4700118 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Automata Buildings Clocks Context Formal languages Real time systems Security Systems engineering and theory Telecommunications Time factors |
title | Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T22%3A07%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Modeling%20System%20Security%20Rules%20with%20Time%20Constraints%20Using%20Timed%20Extended%20Finite%20State%20Machines&rft.btitle=2008%2012th%20IEEE/ACM%20International%20Symposium%20on%20Distributed%20Simulation%20and%20Real-Time%20Applications&rft.au=Mallouli,%20W.&rft.date=2008-10&rft.spage=173&rft.epage=180&rft.pages=173-180&rft.issn=1550-6525&rft.isbn=0769534252&rft.isbn_list=9780769534251&rft_id=info:doi/10.1109/DS-RT.2008.22&rft_dat=%3Cieee_6IE%3E4700118%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-h279t-b5af1d34eff30a2efc3dbb9e7833b11aaa01c1ae160fed5ea510055d2b29878b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4700118&rfr_iscdi=true |