Skip to main content

Advertisement

SpringerLink
Book cover

The Future Internet Assembly

FIA 2011: The Future Internet pp 193–207Cite as

  1. Home
  2. The Future Internet
  3. Conference paper
Towards Formal Validation of Trust and Security in the Internet of Services

Towards Formal Validation of Trust and Security in the Internet of Services

  • Roberto Carbone18,
  • Marius Minea19,
  • Sebastian Alexander Mödersheim20,
  • Serena Elisa Ponta21,22,
  • Mathieu Turuani23 &
  • …
  • Luca Viganò24 
  • Conference paper
  • Open Access
  • 32k Accesses

  • 2 Citations

Part of the Lecture Notes in Computer Science book series (LNCCN,volume 6656)

Abstract

Service designers and developers, while striving to meet the requirements posed by application scenarios, have a hard time to assess the trust and security impact of an option, a minor change, a combination of functionalities, etc., due to the subtle and unforeseeable situations and behaviors that can arise from this panoply of choices. This often results in the release of flawed products to end-users. This issue can be significantly mitigated by empowering designers and developers with tools that offer easy to use graphical interfaces and notations, while employing established verification techniques to efficiently tackle industrial-size problems. The formal verification of trust and security of the Internet of Services will significantly boost its development and public acceptance.

Keywords

  • Security Protocol
  • Security Property
  • Abstract Interpretation
  • Horn Clause
  • Formal Validation

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download conference paper PDF

References

  1. Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. Journal of Applied Non-Classical Logics, special issue on Logic and Information Security, 403–429 (2009)

    CrossRef  MathSciNet  Google Scholar 

  2. Armando, A., Carbone, R., Compagna, L., Cuéllar, J., Pellegrino, G., Sorniotti, A.: From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? In: Proceedings of IFIP SEC 2011 (to appear)

    Google Scholar 

  3. Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra Abad, L.: Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pp. 1–10. ACM Press, New York (2008)

    Google Scholar 

  4. AVANTSSAR: Automated Validation of Trust and Security of Service-Oriented Architectures. FP7-ICT-2007-1, Project No. 216471, http://www.avantssar.eu , 01.01.2008–31.12.2010

  5. Bhargavan, K., Fournet, C., Gordon, A.D.: Verified Reference Implementations of WS-Security Protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, pp. 88–106. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  6. Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: Tulafale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 197–222. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  7. Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 82–96. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  8. Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Static validation of security protocols. Journal of Computer Security 13(3), 347–390 (2005)

    CrossRef  Google Scholar 

  9. Boichut, Y., Héam, P.-C., Kouchnarenko, O.: TA4SP (2004), http://www.univ-orleans.fr/lifo/Members/Yohan.Boichut/ta4sp.html

  10. Bortolozzo, M., Centenaro, M., Focardi, R., Steel, G.: Attacking and Fixing PKCS#11 Security Tokens. In: Proceedings of the 17th ACM conference on Computer and Communications Security (CCS 2010), pp. 260–269. ACM Press, New York (2010)

    Google Scholar 

  11. Chevalier, Y., Mekki, M.A., Rusinowitch, M.: Automatic Composition of Services with Security Policies. In: Proceedings of Web Service Composition and Adaptation Workshop (held in conjunction with SCC/SERVICES-2008), pp. 529–537. IEEE Computer Society Press, Los Alamitos (2008)

    Google Scholar 

  12. Ciobâca, S., Cortier, V.: Protocol composition for arbitrary primitives. In: Proceedings of 23rd IEEE Computer Security Foundations Symposium, pp. 322–336. IEEE Computer Society Press, Los Alamitos (2010)

    Google Scholar 

  13. Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)

    Google Scholar 

  14. Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. Technical Report LSV-03-3, Laboratoire Specification and Verification, ENS de Cachan, France (2003)

    CrossRef  Google Scholar 

  15. Cortier, V., Delaune, S.: Safely composing security protocols. Formal Methods in System Design 34(1), 1–36 (2009)

    CrossRef  Google Scholar 

  16. Datta, A., Derek, A., Mitchell, J., Pavlovic, D.: Secure protocol composition. In: Proceedings of the 19th MFPS, ENTCS 83, Elsevier, Amsterdam (2004)

    Google Scholar 

  17. Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory 2(29) (1983)

    Google Scholar 

  18. Hodkinson, I., Reynolds, M.: Temporal Logic. In: Blackburn, P., van Benthem, J., Wolter, F. (eds.) Handbook of Modal Logic, pp. 655–720. Elsevier, Amsterdam (2006)

    Google Scholar 

  19. Lucchi, R., Mazzara, M.: A pi-calculus based semantics for WS-BPEL. Journal of Logic and Algebraic Programming 70(1), 96–118 (2007)

    CrossRef  MathSciNet  Google Scholar 

  20. Marconi, A., Pistore, M.: Synthesis and Composition of Web Services. In: Bernardo, M., Padovani, L., Zavattaro, G. (eds.) SFM 2009. LNCS, vol. 5569, pp. 89–157. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  21. Mödersheim, S.: Abstraction by Set-Membership — Verifying Security Protocols and Web Services with Databases. In: Proceedings of 17th ACM conference on Computer and Communications Security (CCS 2010), pp. 351–360. ACM Press, New York (2010)

    Google Scholar 

  22. Mödersheim, S., Viganò, L.: Secure Pseudonymous Channels. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 337–354. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  23. Mödersheim, S., Viganò, L.: The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 166–194. Springer, Heidelberg (2009)

    CrossRef  Google Scholar 

  24. Oasis Consortium. Web Services Business Process Execution Language vers. 2.0 (2007), http://docs.oasis-open.org/wsbpel/2.0/OS/wsbpel-v2.0-OS.pdf

  25. Pnueli, A.: The Temporal Logic of Programs. In: Proceedings of the 18th IEEE Symposium on Foundations of Computer Science, pp. 46–57. IEEE Computer Society Press, Los Alamitos (1977)

    Google Scholar 

  26. T.  Dierks and E.  Rescorla. The Transport Layer Security (TLS) Protocol, Version 1.2. IETF RFC 5246 (Aug. 2008)

    Google Scholar 

  27. Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277–286. Springer, Heidelberg (2006)

    CrossRef  Google Scholar 

  28. Weidenbach, C., Afshordel, B., Brahm, U., Cohrs, C., Engel, T., Keen, E., Theobalt, C., Topic, D.: System Description: Version 1.0.0. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol. 1632, pp. 378–382. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Security & Trust Unit, FBK, Trento, Italy

    Roberto Carbone

  2. Institute e-Austria, Timişoara, Romania

    Marius Minea

  3. DTU, Lyngby, Denmark

    Sebastian Alexander Mödersheim

  4. SAP Research, Mougins, France

    Serena Elisa Ponta

  5. DIST, Università di Genova, Italy

    Serena Elisa Ponta

  6. LORIA & INRIA, Nancy Grand Est, France

    Mathieu Turuani

  7. Dipartimento di Informatica, Università di Verona, Italy

    Luca Viganò

Authors
  1. Roberto Carbone
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Marius Minea
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Sebastian Alexander Mödersheim
    View author publications

    You can also search for this author in PubMed Google Scholar

  4. Serena Elisa Ponta
    View author publications

    You can also search for this author in PubMed Google Scholar

  5. Mathieu Turuani
    View author publications

    You can also search for this author in PubMed Google Scholar

  6. Luca Viganò
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Knowledge Media Institute (KMi), The Open University, Milton Keynes, UK

    John Domingue

  2. Dept. of Electronic and Electrical Engineering, University College London, London, UK

    Alex Galis

  3. Eurescom GmbH, Heidelberg, Germany

    Anastasius Gavras

  4. Synelixis/TEI of Chalkida, Greece

    Theodore Zahariadis

  5. Knowledge Media Institute, The Open University, Milton Keynes, UK

    Dave Lambert

  6. Waterford Institute of Technology –TSSG, Waterford, Ireland

    Frances Cleary

  7. CERTH-ITI, Thessaloniki, Greece

    Petros Daras

  8. Ericsson Serbia, Belgrade, Serbia

    Srdjan Krco

  9. Business Information Systems, University of Applied Sciences Western Switzerland, Sierre, Switzerland

    Henning Müller

  10. IC Focus, London, UK

    Man-Sze Li

  11. ESoCE Net, Dialogic, Aalto University School of Economics (CKIR), Aalto, Finland

    Hans Schaffers

  12. SAP Research, Sophia Antipolis, France

    Volkmar Lotz

  13. Universidad Politécnica de Madrid, Spain

    Federico Alvarez

  14. University of Zurich, Switzerland

    Burkhard Stiller

  15. SAP Research, Karlsruhe, Germany

    Stamatis Karnouskos

  16. Université Pierre et Marie Curie (UPMC), Paris, France

    Susanna Avessta

  17. Lulea University of Technology, Lulea, Sweden

    Michael Nilsson

Rights and permissions

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Reprints and Permissions

Copyright information

© 2011 The Author(s)

About this paper

Cite this paper

Carbone, R., Minea, M., Mödersheim, S.A., Ponta, S.E., Turuani, M., Viganò, L. (2011). Towards Formal Validation of Trust and Security in the Internet of Services. In: , et al. The Future Internet. FIA 2011. Lecture Notes in Computer Science, vol 6656. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20898-0_14

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-20898-0_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20897-3

  • Online ISBN: 978-3-642-20898-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Over 10 million scientific documents at your fingertips

Switch Edition
  • Academic Edition
  • Corporate Edition
  • Home
  • Impressum
  • Legal information
  • Privacy statement
  • California Privacy Statement
  • How we use cookies
  • Manage cookies/Do not sell my data
  • Accessibility
  • FAQ
  • Contact us
  • Affiliate program

Not affiliated

Springer Nature

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.