Cargando…

Interleaving vs True Concurrency: Some Instructive Security Examples

Information flow security properties were defined some years ago in terms of suitable equivalence checking problems. These definitions were provided by using sequential models of computations (e.g., labeled transition systems [17, 26]), and interleaving behavioral equivalences (e.g., bisimulation eq...

Descripción completa

Detalles Bibliográficos
Autor principal: Gorrieri, Roberto
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7324258/
http://dx.doi.org/10.1007/978-3-030-51831-8_7
_version_ 1783551903873892352
author Gorrieri, Roberto
author_facet Gorrieri, Roberto
author_sort Gorrieri, Roberto
collection PubMed
description Information flow security properties were defined some years ago in terms of suitable equivalence checking problems. These definitions were provided by using sequential models of computations (e.g., labeled transition systems [17, 26]), and interleaving behavioral equivalences (e.g., bisimulation equivalence [27]). More recently, the distributed model of Petri nets has been used to study non-interference in [1, 5, 6], but also in these papers an interleaving semantics was used. By exploiting a simple process algebra, called CFM [18] and equipped with a Petri net semantics, we provide some examples showing that team equivalence, a truly-concurrent behavioral equivalence proposed in [19, 20], is much more suitable to define information flow security properties. The distributed non-interference property we propose, called DNI, is very easily checkable on CFM processes, as it is compositional, so that it does not suffer from the state-space explosion problem. Moreover, DNI is characterized syntactically on CFM by means of a type system.
format Online
Article
Text
id pubmed-7324258
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73242582020-06-30 Interleaving vs True Concurrency: Some Instructive Security Examples Gorrieri, Roberto Application and Theory of Petri Nets and Concurrency Article Information flow security properties were defined some years ago in terms of suitable equivalence checking problems. These definitions were provided by using sequential models of computations (e.g., labeled transition systems [17, 26]), and interleaving behavioral equivalences (e.g., bisimulation equivalence [27]). More recently, the distributed model of Petri nets has been used to study non-interference in [1, 5, 6], but also in these papers an interleaving semantics was used. By exploiting a simple process algebra, called CFM [18] and equipped with a Petri net semantics, we provide some examples showing that team equivalence, a truly-concurrent behavioral equivalence proposed in [19, 20], is much more suitable to define information flow security properties. The distributed non-interference property we propose, called DNI, is very easily checkable on CFM processes, as it is compositional, so that it does not suffer from the state-space explosion problem. Moreover, DNI is characterized syntactically on CFM by means of a type system. 2020-06-02 /pmc/articles/PMC7324258/ http://dx.doi.org/10.1007/978-3-030-51831-8_7 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Gorrieri, Roberto
Interleaving vs True Concurrency: Some Instructive Security Examples
title Interleaving vs True Concurrency: Some Instructive Security Examples
title_full Interleaving vs True Concurrency: Some Instructive Security Examples
title_fullStr Interleaving vs True Concurrency: Some Instructive Security Examples
title_full_unstemmed Interleaving vs True Concurrency: Some Instructive Security Examples
title_short Interleaving vs True Concurrency: Some Instructive Security Examples
title_sort interleaving vs true concurrency: some instructive security examples
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7324258/
http://dx.doi.org/10.1007/978-3-030-51831-8_7
work_keys_str_mv AT gorrieriroberto interleavingvstrueconcurrencysomeinstructivesecurityexamples