Figure 8 - uploaded by Shiu-Kai Chin
Content may be subject to copyright.
Interpretation color-to-bool-pair: implementation of color with a boolean pair  

Interpretation color-to-bool-pair: implementation of color with a boolean pair  

Source publication
Conference Paper
Full-text available
Developing systems that are assured to be secure requires precise and accurate descriptions of specifications, designs, implementations, and security properties. Formal specification and verification have long been recognized as giving the highest degree of assurance. In this paper, we describe a software development process that integrates formal...

Similar publications

Conference Paper
Full-text available
Reconfigurable memory arrays with spare rows and columns are quite frequently used as reliable data storage components in present age System-on-Chips (SoCs). The spare memory rows and columns can be utilized to automatically replace rows or columns that are found to contain a cell fault after fabrication. One of the biggest SoC design challenges is...
Article
Full-text available
The correct functioning of interactive computer systems depends on both the faultless operation of the device and correct human actions. In this paper, we focus on system malfunctions due to human actions. We present abstract principles that generate cognitively plausible human behaviour. These principles are then formalised in a higher-order logic...
Conference Paper
Full-text available
Timed Interval Calculus (TIC) is a highly expressive set-based no- tation for specifying and reasoning about embedded real-time sys- tems. However, it lacks mechanical proving support, as its verifica- tion usually involves infinite time intervals and continuous dynam- ics. In this paper, we develop a system based on a generic theorem prover, Proto...
Article
Full-text available
Theorem proving is an important approach in formal verification. Higher-order logic is a form of predicate logic that is distinguished from first-order logic by additional quantifiers and stronger semantics. Higher-order logic is more expressive. This paper presents the formalization of the linear space theory in HOL4. A set of properties is charac...
Article
Full-text available
We describe a framework for the simulation of control logics specified in the higher-order logic of the Prototype Verification System. The framework offers a library of prede-fined modules, a method for the composition of more complex modules, and an event-driven simulation engine. A developer defines a system architecture by composing its model ou...

Citations

... Privacy Enhanced Mail (PEM) (IETF RFCs 1421-4) has mechanisms for privacy, integrity, source authentication, and nonrepudiation using public and private key encryption and end-to-end encryption. Zhou et al. [28] use formal tools to verify the properties of PEM. Abadi et al. [1] use a trusted third party to achieve message and source authentication and formally prove correctness of their messaging protocol. ...
Preprint
Full-text available
Web services offer an opportunity to redesign a variety of older systems to exploit the advantages of a flexible, extensible, secure set of standards. In this work we revisit WSEmail, a system proposed over ten years ago to improve email by redesigning it as a family of web services. WSEmail offers an alternative vision of how IM and email services could have evolved, offering security, extensibility, and openness in a distributed environment instead of the hardened walled gardens that today's rich messaging systems have become. We demonstrate the flexibility of WSEmail using three business use cases: secure channel IM, business workflows with routed forms, and on-demand attachments. Since increased flexibility often mitigates against security and performance, we designed WSEmail with security in mind and formally proved the security of one of its core protocols (on-demand attachments) using the TulaFale and ProVerif automated proof tools. We also provide performance measures for the basic WSEmail functions in a prototype we implemented using .NET. Our experiments show a latency of about a quarter of a second per transaction under load.
... Trois autres propriétés, à savoir l'authentification, la non-répudiation et le contrôle d'accès, ont été ajoutées aux propriétés initiales pour former CIA+ [47]. Ces six propriétés s'appliquent aux systèmes de messagerie [48][49] [50]. Les définitions, extraites de la norme de l'ITU 25 X.800 [51], de ces propriétés sont les suivantes: ...
... doivent disposer d'un mécanisme permettant de découvrir la présence du serveur de politiques. Nous proposons de baser ce mécanisme sur le service de nom du domaine (Domain Name System -DNS48 ). Dans ce cas, un agent transmet une requête auprès du DNS afin d'obtenir le nom du serveur de politiques. ...
Article
The ease of use and efficiency of the email service contributed to its widespread adoption. It became an essential service and authorizing multiples and various uses (private, professional, administrative, governmental, military ...). However, all existing systems are technically reduced to the implementation of global policies, compiling in a static way a limited set of features. These approaches prevent differentiated adaptations of the system to the uses. The rigid and monolithic nature of these policies can moreover lead to unnecessary execution of expensive treatments or to the inability to simultaneously satisfy conflicting requirements. We address this problem of the evolution of e-mail in the general context of interpersonal communication of a sender to a receiver. We identify the sender's intention of communication, as a key parameter of any interpersonal communication, insofar as it allows to finely discriminate the successful communications, between all the ones that are understood. A second parameter which is orthogonal to the first, defined as the context of the sender, is important because it allows to determine the successful aspect of an interpersonal communication. The declination of these two parameters in the electronic mail led us to define the concept of electronic correspondence. This one is a generalization of the email the implementation of which provides a sufficient condition of qualification successful exchanges via this medium. A correspondence allows taking into account for each message, the intention of communication and context of its sender. Its implementation requires in certain points of the network, the enforcement of specific policies depending of an administrative domain and which take as argument the intention of communication and the current context of the sender. A second benefit provided by this concept concerns the level of customization of messaging reaching a maximum granularity, because it can be applied in a differentiated way, to each message instance. These works led to the description of a representative architecture and the definition of three extensions to existing standards (SUBMISSION, IMF and S/MIME). Our approach has been illustrated through two main use cases, compliant with recommended specifications for administration (RGS - Référentiel Général de Sécurité) and military (MMHS - Military Message Handling System) domains.
... Dan Zhou et al. [6] describe the application of their development process to the development of a Privacy Enhanced Mail (PEM) system. The purpose of this work was to demonstrate an integrated verification and synthesis process on an engineering application. ...
Article
Full-text available
Email system has become the widely preferred means of information transfer in the modern business. Conventional email system is secured by a password system leading to a single layer of protection which is insufficient for guaranteed security. Modern businesses are more relying on electronic mail for communication with their clients and colleagues revealing the need for more privacy of sensitive information. The email is connected through many routers and mail servers on its way to the recipient by becoming vulnerable to both physical as well as virtual eavesdropping. The current industry standards do not place much emphasis on security as the information is transferred in plain text and the mail servers will be regularly performing the backups of the emails passing through. This leaves a digital paper trail that can be easily inspected months or years later which can be read by any cracker who gains access to an unprotected router. The proposed system helps to secure the sensitive information sent through email by providing a three layer authentication mechanism.
... In order to satisfy the increasingly urgent security requirements, we must establish a secure mail system to improve the email security by employing encryption, digital signatures, integrity checks, and bulk encryption, and many other security features in addition to regular email software. The security of email system is important to the security of the whole system and it is very meaningful to research on the security of email [1] [2]. ...
Article
Full-text available
Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can’t be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.
... Their protocol has an intermediary, the Network Access Server (NAS), which is similar to our ALSP in some respects, but they focus on functional properties of the protocol rather than proving a correspondence theorem. Efforts at the formal verification of messaging protocols include Zhou, et al.'s [29] work on verifying the properties of Privacy Enhanced Mail (IETF RFCs 1421–4) and Abadi, et al.'s [1] formal proof of correctness for a trusted third party messaging system. For our formal analysis we used the TulaFale language, a product of the Samoa (securing.ws) ...
Conference Paper
Home medical devices enable individuals to monitor some of their own health information without the need for visits by nurses or trips to medical facilities. This enables more continuous information to be provided at lower cost and will lead to better healthcare outcomes. The technology depends on network communication of sensitive health data. Requirements for reliability and ease-of-use provide challenges for securing these communications. In this paper we look at protocols for the drop-box architecture, an approach to assisted living that relies on a partially-trusted Assisted Living Service Provider (ALSP). We sketch the requirements and architecture for assisted living based on this architecture and describe its communication protocols. In particular, we give a detailed description of its report and alarm transmission protocols and give an automated proof of correspondence theorems for them. Our formulation shows how to characterize the partial trust vested in the ALSP and use the existing tools to verify this partial trust.
... FMD maintains the duality problem. Suggestions for the integration of security and normal ISD/SW development have been proposed, including Zhou et al. (1999). These are, however, mainly concentrated on implementation (some even more specified) issues, ignoring logical level issues (e.g. ...
Conference Paper
Full-text available
Because the methods of development for Information Systems (IS) do not pay attention to security aspects, several information systems (ISS) security methods have been presented. This paper will analyze traditional/conventional approaches, namely normative standards (e.g. checklists, management and evaluation standards), formal methods, common sense principles and risk management. These approaches will be analyzed in the light of I) the research objectives; II) the organizational role of IS security; III) research approaches used; IV) applicability; and V) a conceptual meta-model for IS. The contribution of the paper is twofold. First the analysis sheds hew light on the underlying foundations of the conventional approaches. Second, the analysis suggests several implications for researchers and practitioners.
... In order to build a high-confidence secure operating system such that high-level security properties are accounted for at the implementation level, we need to have (1) a precise and accurate description of the desired security properties, (2) a design that satisfies the system's desired security properties, and (3) a correct realization of the design in implementation [14]. ...
Article
To construct a secure operating system with high assurance, it is essential that the security architecture of the operating system can be analyzed vigorously and that the architecture can be easily understood by engineers who translate the design into code. In this paper we describe a partial model of the security policies of an operating system which implements a variant of the Bell-LaPadula model. In particular, we describe the privileges of trusted subjects and how they are used in granting accesses. We use a combination of an object-oriented modeling technique, the Unified Modeling Language (UML), and a mathematically-based formal method called Higher-Order Logic (HOL). UML provides a visual, intuitive model that is easy to write and easily understood by engineers. HOL provides a rigorous model whose properties can be mechanically proved, thus allowing the correctness of the model to be established. UML models provide the structure for natural language descriptions and HOL models. HOL models add precise semantics to both text descriptions and UML models.
... These theories are then transformed into SPECWARE specifications, which are then refined into executable code. This approach has been used to formally define and specified much of a secure electronic mail protocol, RFC 1421 -Privacy Enhanced Mail, [4]; these results have been reported elsewhere [9, 10, 8j. HOL theories and SPECWARE specifications are both higher-order theories, so the mapping between them is fairly straightforward. ...
Article
Full-text available
Mature engineering fields have methods of construction that have high likelihoods of success, and that guarantee the proper functioning of systems, even within hostile environments. These methods relate behavior to structure and have underlying notions of composition related to the implementation domain. Unfortunately, the construction of computer systems has not yet reached the same level of maturity. While many mathematical theories have been developed, they have in yet been brought into standard engineering practice. Bridging the gap between theory and engineering practice requires sound and pragmatic principles of construction and composition for software systems. One potentially promising and practical approach employs a combination of higher-order logic, category theory, and algebraic specifications, as incorporated into the HOL theorem prover and the Specware system for specification composition, refinement, and code synthesis. This report presents a HOL formulation of the primary mathematical concepts underlying Specware, fully explicating the underlying principles of construction and composition. Furthermore, the purpose of computer-assisted reasoning is to allow nonexperts in a given domain to nonetheless have confidence in their analysis. The HOL formulation describes the relevant concepts in an executable form that nonexperts can use in the future to construct assured specifications and ultimately assured code.
... Rather we want to add enough formality to the protocol analysis so that we can account for security properties in concrete implementations. As a practical demonstration, we have carried out the formal development process down to the generation of C++ code of the secure coreemail protocol and Privacy Enhanced Email and have reported the result in [15] . This paper concentrates on a formal analysis of the secure channel. ...
Conference Paper
Full-text available
. To construct a highly-assured implementation of secure communication channels we must have clear definitions of the security services, the channels, and under what assumptions these channels provide the desired services. We formally define secure channel services and develop a detailed example. The example is a core protocol common to a family of secure email systems. We identify the necessary properties of cryptographic algorithms to ensure that the email protocol is secure, and we verify that the email protocol provides secure services under these assumptions. We carry out the definitions and verifications in higherorder logic using the HOL theorem-prover. All our definitions and theorems are conservative extensions to the logic of HOL. 1 Introduction Numerous security protocols are used for secure transactions in networked systems. To construct high-confidence implementations of these protocols, we need to have protocols that provide security services and to implement t...