Skip to main content
Log in

Verification of Compliance for Multilevel Models in Individual Trace Semantics

  • Published:
Programming and Computer Software Aims and scope Submit manuscript

Abstract

This paper presents new verification techniques that target to prove multimodel compliance in terms of individual trace semantics. As compared to traditional approaches based on the refinement relation, these techniques are simpler and more suitable for solving practical problems in verifying complex functional requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Alpern, B. and Schneider, F.B., Defining liveness, Inf. Process. Lett., 1985, vol. 21, no. 4, pp. 181–185.

    Article  MathSciNet  Google Scholar 

  2. Khoroshilov, A., On formalization of operating systems behaviour verification, Proc. 11th Int. Conf. Computer Science and Information Technologies (CSIT), 2017, pp. 168–172.

  3. Kulyamin, V.V., Pakulin, N.V., Petrenko, O.L., Sortov, A.A., and Khoroshilov, A.V., Formalization of requirements in practice, Preprint Inst. Syst. Program., Russ. Acad. Sci., Moscow, 2006.

    Google Scholar 

  4. He, J., Hoare, C.A.R., and Sanders, J.W., Data refinement refined, Lect. Notes Comput. Sci., 1986, vol. 213, pp. 187–196.

    Article  Google Scholar 

  5. Abrial, J.R., Cansell, D., Méry, D., Refinement and reachability in Event-B, Lect. Notes Comput. Sci., 2005, vol. 3455, pp. 222–241.

    Article  Google Scholar 

  6. Back, R.J.R., Refinement of parallel and reactive programs, Program Design Calculi, Broy, M., Ed., Springer, 1993, pp. 73–92.

    Google Scholar 

  7. Butler, M., An approach to the design of distributed systems with B AMN, Lect. Notes Comput. Sci., 1997, vol. 1212, pp. 223–241.

    Google Scholar 

  8. Aceto, L., Action Refinement in Process Algebras, Cambridge University Press, 1992.

    MATH  Google Scholar 

  9. Derrick, J. and Boiten, E.A., Non-atomic refinement in Z, Lect. Notes Comput. Sci., 1999, vol. 1708, pp. 1477–1496.

    Article  Google Scholar 

  10. Schellhorn, G., ASM refinement and generalizations of forward simulation in data refinement: A comparison, Theor. Comput. Sci., 2005, vol. 336, nos. 2–3, pp. 403–436.

    Article  MathSciNet  Google Scholar 

  11. Devyanin, P.N., Kulyamin, V.V., Oruzheinikov, A.L., Petrenko, A.K., Khoroshilov, A.V., and Shchepetkov, I.V., Patent no. 2682003, A method for verifying a formal automaton model of a software system’s behavior, 2019.

  12. Devyanin, P.N., Efremov, D.V., Kulyamin, V.V., Petrenko, A.K., Khoroshilov, A.V., and Shchepetkov, I.V., Modelirovanie i verifikatsiya politik bezopasnosti upravleniya dostupom v operatsionnykh sistemakh (Modeling and Verification of Access Control Security Policies in Operating Systems), Moscow: Goryachaya liniya–Telekom, 2019.

  13. Devyanin, P.N., Kuliamin, V.V., Petrenko, A.K., Khoroshilov, A.V., and Shchepetkov, I.V., Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system, Program. Comput. Software, 2020, vol. 46, no. 7, pp. 443–453. https://doi.org/10.1134/S0361768820070026

    Article  Google Scholar 

  14. Kuliamin, V., Khoroshilov, A., and Medvedev, D., Formal modeling of multi-level security and integrity control implemented with SELinux, Proc. Int. Conf. Actual Problems of Systems and Software Engineering (APSSE), 2019, pp. 131–136.

  15. Khoroshilov, A.V. and Shchepetkov, I.V., ADV_SPM: Formal security policy models in practice, Tr. Inst. Sist. Program. Ross. Akad. Nauk (Proc. Inst. Syst. Program. Russ. Acad. Sci.), 2017, vol. 29, no. 3, pp. 43–56. https://doi.org/10.15514/ISPRAS-2017-29(3)-4

  16. ISO/IEC 15408-1:2012 “Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model.”

  17. ISO/IEC 15408-2:2013 “Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional requirements.”

  18. ISO/IEC 15408-3:2013 “Information technology – Security techniques – Evaluation criteria for IT security – Part 3: Security assurance requirements.”

Download references

Funding

This work was supported by the Russian Foundation for Basic Research, project no. 20-07-00954.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. V. Khoroshilov.

Additional information

Translated by Yu. Kornienko

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Khoroshilov, A.V. Verification of Compliance for Multilevel Models in Individual Trace Semantics. Program Comput Soft 47, 515–521 (2021). https://doi.org/10.1134/S0361768821070069

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S0361768821070069

Navigation