Skip to main content
Log in

A verification approach to applied system security

  • Special section on formal methods for industrial critical systems
  • Published:
International Journal on Software Tools for Technology Transfer Aims and scope Submit manuscript

Abstract

We present a method for the security analysis of realistic models over off-the-shelf systems and their configuration by formal, machine-checked proofs. The presentation follows a large case study based on a formal security analysis of a CVS-Server architecture.

The analysis is based on an abstract architecture (enforcing a role-based access control), which is refined to an implementation architecture (based on the usual discretionary access control provided by the POSIX environment). Both architectures serve as a skeleton to formulate access control and confidentiality properties.

Both the abstract and the implementation architecture are specified in the language Z. Based on a logical embedding of Z into Isabelle/HOL, we provide formal, machine-checked proofs for consistency properties of the specification, for the correctness of the refinement, and for security properties.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Brucker AD, Rittinger F, Wolff B (2002) A CVS-Server security architecture – concepts and formal analysis. Technical Report 182, Albert-Ludwigs-Universität, Freiburg, Germany

  2. Brucker AD, Rittinger F, Wolff, B (2003) HOL-Z 2.0: A proof environment for Z-specifications. J Univers Comput Sci 9(2):152–172

    Google Scholar 

  3. Cederqvist P et al (2000) Version management with CVS. http://www.cvshome.org/docs/manual/

  4. Fogel K, Bar M (2003) Open source development with CVS. Paraglyph Press, Phoenix, AZ

  5. Frisch AE (1995) Essential System Administration. O’Reilly, Sebastopol, CA

  6. Garlan D, Shaw M (1993) An introduction to software architecture. In: Advances in software engineering and knowledge engineering, World Scientific, Singapore, pp 1–39

  7. Gordon MJC, Melham TF (1993) Introduction to HOL. Cambridge University Press

  8. Jürjens J (2001) Secrecy-preserving refinement. In: Formal Methods Europe (FME). Lecture notes in computer science, vol 2021. Springer, Berlin Heidelberg New York

  9. Nipkow T, Paulson LC, Wenzel M (2002) Isabelle/HOL – A proof assistant for higher-order logic. Lecture notes in computer science, vol 2283. Springer, Berlin Heidelberg New York

  10. Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comput Secur 6:85–128

    Article  Google Scholar 

  11. Roscoe A (1998) Theory and practice of concurrency. Prentice Hall, Upper Saddle River, NJ

  12. Sandhu R, Ahn G-J (1998) Decentralized group hierarchies in UNIX: an experiment and lessons learned. In: Conference on national information systems security, pp 486–502

  13. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47

    Article  Google Scholar 

  14. Santen T, Heisel M, Pfitzmann A (2002) Confidentiality-preserving refinement is compositional – sometimes. In: ESORICS. Lecture notes in computer science, vol 2502. Springer, Berlin Heidelberg New York, pp 194–211

  15. Shaw M, Garlan D (1996) Software architecture: perspectives on an emerging discipline. Prentice Hall, Upper Saddle River, NJ

    Google Scholar 

  16. Spivey JM (1992) The Z notation: a reference manual. Prentice Hall, Upper Saddle River, NJ. http://spivey.oriel.ox.ac.uk/ mike/zrm/

  17. The Open Group, IEEE (2002) The Single UNIX Specification Version 3. [Supersedes “Single UNIX Specification Version 2” (Unix 98) and “IEEE Standard 1003.1-2001” (POSIX.1)]

  18. Woodcock J, Davies J (1996) Using Z: specification, refinement, and proof. Prentice Hall, Upper Saddle River, NJ. http://www.usingz.com/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Achim D. Brucker.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brucker, A., Wolff, B. A verification approach to applied system security. Int J Softw Tools Technol Transfer 7, 233–247 (2005). https://doi.org/10.1007/s10009-004-0176-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10009-004-0176-3

Keywords

Navigation