Loading…

Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines

Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system bui...

Full description

Saved in:
Bibliographic Details
Main Authors: Mallouli, W., Mammar, A., Cavalli, A.R.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 180
container_issue
container_start_page 173
container_title
container_volume
creator Mallouli, W.
Mammar, A.
Cavalli, A.R.
description Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.
doi_str_mv 10.1109/DS-RT.2008.22
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4700118</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4700118</ieee_id><sourcerecordid>4700118</sourcerecordid><originalsourceid>FETCH-LOGICAL-h279t-b5af1d34eff30a2efc3dbb9e7833b11aaa01c1ae160fed5ea510055d2b29878b3</originalsourceid><addsrcrecordid>eNotjE9Lw0AUxBdUsNYePXnZL5D43m42f44S2yq0CE16Dpvsi1lpU8lu0Xx7U3QOMz8GZhh7QAgRIXt6KYJdGQqANBTiit1BEmdKRkKJazZDpSCIlVC3bOHcJ0ySWRQjzli1PRk62P6DF6PzdOQFNefB-pHvzgdy_Nv6jpf2SDw_9c4P2vbe8b27LC614csfT72ZYGV764kXXk--1U1ne3L37KbVB0eL_5yz_WpZ5q_B5n39lj9vgk4kmQ9qpVs0MqK2laAFtY00dZ1RkkpZI2qtARvUhDG0ZBRphQBKGVGLLE3SWs7Z49-vJaLqa7BHPYxVlAAgpvIXUahU1A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mallouli, W. ; Mammar, A. ; Cavalli, A.R.</creator><creatorcontrib>Mallouli, W. ; Mammar, A. ; Cavalli, A.R.</creatorcontrib><description>Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.</description><identifier>ISSN: 1550-6525</identifier><identifier>ISBN: 0769534252</identifier><identifier>ISBN: 9780769534251</identifier><identifier>DOI: 10.1109/DS-RT.2008.22</identifier><language>eng</language><publisher>IEEE</publisher><subject>Automata ; Buildings ; Clocks ; Context ; Formal languages ; Real time systems ; Security ; Systems engineering and theory ; Telecommunications ; Time factors</subject><ispartof>2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008, p.173-180</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4700118$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54555,54920,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4700118$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mallouli, W.</creatorcontrib><creatorcontrib>Mammar, A.</creatorcontrib><creatorcontrib>Cavalli, A.R.</creatorcontrib><title>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</title><title>2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications</title><addtitle>DISRTA</addtitle><description>Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.</description><subject>Automata</subject><subject>Buildings</subject><subject>Clocks</subject><subject>Context</subject><subject>Formal languages</subject><subject>Real time systems</subject><subject>Security</subject><subject>Systems engineering and theory</subject><subject>Telecommunications</subject><subject>Time factors</subject><issn>1550-6525</issn><isbn>0769534252</isbn><isbn>9780769534251</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjE9Lw0AUxBdUsNYePXnZL5D43m42f44S2yq0CE16Dpvsi1lpU8lu0Xx7U3QOMz8GZhh7QAgRIXt6KYJdGQqANBTiit1BEmdKRkKJazZDpSCIlVC3bOHcJ0ySWRQjzli1PRk62P6DF6PzdOQFNefB-pHvzgdy_Nv6jpf2SDw_9c4P2vbe8b27LC614csfT72ZYGV764kXXk--1U1ne3L37KbVB0eL_5yz_WpZ5q_B5n39lj9vgk4kmQ9qpVs0MqK2laAFtY00dZ1RkkpZI2qtARvUhDG0ZBRphQBKGVGLLE3SWs7Z49-vJaLqa7BHPYxVlAAgpvIXUahU1A</recordid><startdate>200810</startdate><enddate>200810</enddate><creator>Mallouli, W.</creator><creator>Mammar, A.</creator><creator>Cavalli, A.R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200810</creationdate><title>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</title><author>Mallouli, W. ; Mammar, A. ; Cavalli, A.R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-h279t-b5af1d34eff30a2efc3dbb9e7833b11aaa01c1ae160fed5ea510055d2b29878b3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Automata</topic><topic>Buildings</topic><topic>Clocks</topic><topic>Context</topic><topic>Formal languages</topic><topic>Real time systems</topic><topic>Security</topic><topic>Systems engineering and theory</topic><topic>Telecommunications</topic><topic>Time factors</topic><toplevel>online_resources</toplevel><creatorcontrib>Mallouli, W.</creatorcontrib><creatorcontrib>Mammar, A.</creatorcontrib><creatorcontrib>Cavalli, A.R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mallouli, W.</au><au>Mammar, A.</au><au>Cavalli, A.R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines</atitle><btitle>2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications</btitle><stitle>DISRTA</stitle><date>2008-10</date><risdate>2008</risdate><spage>173</spage><epage>180</epage><pages>173-180</pages><issn>1550-6525</issn><isbn>0769534252</isbn><isbn>9780769534251</isbn><abstract>Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.</abstract><pub>IEEE</pub><doi>10.1109/DS-RT.2008.22</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1550-6525
ispartof 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications, 2008, p.173-180
issn 1550-6525
language eng
recordid cdi_ieee_primary_4700118
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Automata
Buildings
Clocks
Context
Formal languages
Real time systems
Security
Systems engineering and theory
Telecommunications
Time factors
title Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T22%3A07%3A22IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Modeling%20System%20Security%20Rules%20with%20Time%20Constraints%20Using%20Timed%20Extended%20Finite%20State%20Machines&rft.btitle=2008%2012th%20IEEE/ACM%20International%20Symposium%20on%20Distributed%20Simulation%20and%20Real-Time%20Applications&rft.au=Mallouli,%20W.&rft.date=2008-10&rft.spage=173&rft.epage=180&rft.pages=173-180&rft.issn=1550-6525&rft.isbn=0769534252&rft.isbn_list=9780769534251&rft_id=info:doi/10.1109/DS-RT.2008.22&rft_dat=%3Cieee_6IE%3E4700118%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-h279t-b5af1d34eff30a2efc3dbb9e7833b11aaa01c1ae160fed5ea510055d2b29878b3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4700118&rfr_iscdi=true