Cargando…
Interleaving vs True Concurrency: Some Instructive Security Examples
Information flow security properties were defined some years ago in terms of suitable equivalence checking problems. These definitions were provided by using sequential models of computations (e.g., labeled transition systems [17, 26]), and interleaving behavioral equivalences (e.g., bisimulation eq...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7324258/ http://dx.doi.org/10.1007/978-3-030-51831-8_7 |
_version_ | 1783551903873892352 |
---|---|
author | Gorrieri, Roberto |
author_facet | Gorrieri, Roberto |
author_sort | Gorrieri, Roberto |
collection | PubMed |
description | Information flow security properties were defined some years ago in terms of suitable equivalence checking problems. These definitions were provided by using sequential models of computations (e.g., labeled transition systems [17, 26]), and interleaving behavioral equivalences (e.g., bisimulation equivalence [27]). More recently, the distributed model of Petri nets has been used to study non-interference in [1, 5, 6], but also in these papers an interleaving semantics was used. By exploiting a simple process algebra, called CFM [18] and equipped with a Petri net semantics, we provide some examples showing that team equivalence, a truly-concurrent behavioral equivalence proposed in [19, 20], is much more suitable to define information flow security properties. The distributed non-interference property we propose, called DNI, is very easily checkable on CFM processes, as it is compositional, so that it does not suffer from the state-space explosion problem. Moreover, DNI is characterized syntactically on CFM by means of a type system. |
format | Online Article Text |
id | pubmed-7324258 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73242582020-06-30 Interleaving vs True Concurrency: Some Instructive Security Examples Gorrieri, Roberto Application and Theory of Petri Nets and Concurrency Article Information flow security properties were defined some years ago in terms of suitable equivalence checking problems. These definitions were provided by using sequential models of computations (e.g., labeled transition systems [17, 26]), and interleaving behavioral equivalences (e.g., bisimulation equivalence [27]). More recently, the distributed model of Petri nets has been used to study non-interference in [1, 5, 6], but also in these papers an interleaving semantics was used. By exploiting a simple process algebra, called CFM [18] and equipped with a Petri net semantics, we provide some examples showing that team equivalence, a truly-concurrent behavioral equivalence proposed in [19, 20], is much more suitable to define information flow security properties. The distributed non-interference property we propose, called DNI, is very easily checkable on CFM processes, as it is compositional, so that it does not suffer from the state-space explosion problem. Moreover, DNI is characterized syntactically on CFM by means of a type system. 2020-06-02 /pmc/articles/PMC7324258/ http://dx.doi.org/10.1007/978-3-030-51831-8_7 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Gorrieri, Roberto Interleaving vs True Concurrency: Some Instructive Security Examples |
title | Interleaving vs True Concurrency: Some Instructive Security Examples |
title_full | Interleaving vs True Concurrency: Some Instructive Security Examples |
title_fullStr | Interleaving vs True Concurrency: Some Instructive Security Examples |
title_full_unstemmed | Interleaving vs True Concurrency: Some Instructive Security Examples |
title_short | Interleaving vs True Concurrency: Some Instructive Security Examples |
title_sort | interleaving vs true concurrency: some instructive security examples |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7324258/ http://dx.doi.org/10.1007/978-3-030-51831-8_7 |
work_keys_str_mv | AT gorrieriroberto interleavingvstrueconcurrencysomeinstructivesecurityexamples |