Abstract
This paper presents new verification techniques that target to prove multimodel compliance in terms of individual trace semantics. As compared to traditional approaches based on the refinement relation, these techniques are simpler and more suitable for solving practical problems in verifying complex functional requirements.
Similar content being viewed by others
REFERENCES
Alpern, B. and Schneider, F.B., Defining liveness, Inf. Process. Lett., 1985, vol. 21, no. 4, pp. 181–185.
Khoroshilov, A., On formalization of operating systems behaviour verification, Proc. 11th Int. Conf. Computer Science and Information Technologies (CSIT), 2017, pp. 168–172.
Kulyamin, V.V., Pakulin, N.V., Petrenko, O.L., Sortov, A.A., and Khoroshilov, A.V., Formalization of requirements in practice, Preprint Inst. Syst. Program., Russ. Acad. Sci., Moscow, 2006.
He, J., Hoare, C.A.R., and Sanders, J.W., Data refinement refined, Lect. Notes Comput. Sci., 1986, vol. 213, pp. 187–196.
Abrial, J.R., Cansell, D., Méry, D., Refinement and reachability in Event-B, Lect. Notes Comput. Sci., 2005, vol. 3455, pp. 222–241.
Back, R.J.R., Refinement of parallel and reactive programs, Program Design Calculi, Broy, M., Ed., Springer, 1993, pp. 73–92.
Butler, M., An approach to the design of distributed systems with B AMN, Lect. Notes Comput. Sci., 1997, vol. 1212, pp. 223–241.
Aceto, L., Action Refinement in Process Algebras, Cambridge University Press, 1992.
Derrick, J. and Boiten, E.A., Non-atomic refinement in Z, Lect. Notes Comput. Sci., 1999, vol. 1708, pp. 1477–1496.
Schellhorn, G., ASM refinement and generalizations of forward simulation in data refinement: A comparison, Theor. Comput. Sci., 2005, vol. 336, nos. 2–3, pp. 403–436.
Devyanin, P.N., Kulyamin, V.V., Oruzheinikov, A.L., Petrenko, A.K., Khoroshilov, A.V., and Shchepetkov, I.V., Patent no. 2682003, A method for verifying a formal automaton model of a software system’s behavior, 2019.
Devyanin, P.N., Efremov, D.V., Kulyamin, V.V., Petrenko, A.K., Khoroshilov, A.V., and Shchepetkov, I.V., Modelirovanie i verifikatsiya politik bezopasnosti upravleniya dostupom v operatsionnykh sistemakh (Modeling and Verification of Access Control Security Policies in Operating Systems), Moscow: Goryachaya liniya–Telekom, 2019.
Devyanin, P.N., Kuliamin, V.V., Petrenko, A.K., Khoroshilov, A.V., and Shchepetkov, I.V., Integrating RBAC, MIC, and MLS in verified hierarchical security model for operating system, Program. Comput. Software, 2020, vol. 46, no. 7, pp. 443–453. https://doi.org/10.1134/S0361768820070026
Kuliamin, V., Khoroshilov, A., and Medvedev, D., Formal modeling of multi-level security and integrity control implemented with SELinux, Proc. Int. Conf. Actual Problems of Systems and Software Engineering (APSSE), 2019, pp. 131–136.
Khoroshilov, A.V. and Shchepetkov, I.V., ADV_SPM: Formal security policy models in practice, Tr. Inst. Sist. Program. Ross. Akad. Nauk (Proc. Inst. Syst. Program. Russ. Acad. Sci.), 2017, vol. 29, no. 3, pp. 43–56. https://doi.org/10.15514/ISPRAS-2017-29(3)-4
ISO/IEC 15408-1:2012 “Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model.”
ISO/IEC 15408-2:2013 “Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional requirements.”
ISO/IEC 15408-3:2013 “Information technology – Security techniques – Evaluation criteria for IT security – Part 3: Security assurance requirements.”
Funding
This work was supported by the Russian Foundation for Basic Research, project no. 20-07-00954.
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated by Yu. Kornienko
Rights and permissions
About this article
Cite this article
Khoroshilov, A.V. Verification of Compliance for Multilevel Models in Individual Trace Semantics. Program Comput Soft 47, 515–521 (2021). https://doi.org/10.1134/S0361768821070069
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1134/S0361768821070069