The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper reports a methodology for the multi-face modeling of discrete-event systems to be used in a framework for the rapid prototyping of supervisory controllers. However Supervisory Control Theory provides a possibility for the synthesis of supervisors proven to respect the specifications, it uses ordinary finite state machines and operations resulting in state explosion, so therefore hardly...
Model transformation is the process of automatically generating a target model from a source model according to a set of transformation rules. Automatic model transformation has the potential to eliminate the complexity, the inconsistencies and faults that are inherent in a manual model transformation process. Many of the existing tools that automate the model transformation process require the encoding...
The specification of security requirements is an important step when specifying new systems and systems of systems or analyzing existing systems with regard to security issues. A common way to formally specify security requirements is by means of safety and liveness properties. The systems in the focus of this paper are uniformly parameterised co operations. Such systems are characterised by the composition...
With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for effective approaches to verifying that a composite service not only offers the required functionality but also satisfies the desired non-functional requirements (NFRs). In high-assurance applications such as traffic control,...
Execution monitoring (EM) is a ubiquitous way for monitoring untrusted applications. In this paper, we concern the characterization of security policies which was seldom concerned before. We define security policy as a security predicate which is a conjunction of two different sub-predicates: sequences predicate and states predicate. This work proves that different implementations of security policies...
This paper exemplifies principles of embedded system design that props safety and security using operational errors management in frame of a dedicated Computer-Based System architecture. After reviewing basic principles of Cyber-Physical Systems as a novel slant (or marker?) to modeling and design in this domain, attention is focused on a real-world solution of a safety and security critical embedded...
This paper presents a new way to verify whether a behavior model of code satisfies a security policy in the model-carrying code(MCC) approach for safe execution of untrusted code. This new verification method based on a new kind of model called logic semantic based automata(LSBA). Logic semantic based pushdown automata(LSBPDA)is to model safety-related behaviors of codes unknown to a user and logic...
Local policies represent security properties that are applied to (parts of) programs or services. They are amenable for developers since they provide for a full compositionality (through scope nesting), for a simple, automaton-like structure and for a direct enforcing through a corresponding execution monitor. Compliance w.r.t. local policies is statically verified against a safe over-approximation...
The railway transportation safety system is a complex dynamic system with spatio-temporal characteristics. However, currently commercial geographical information system (GIS) lacks these capabilities for spatio-temporal analysis and modeling. Cellular automaton (CA) model can provides GIS with a bottom-to-top spatio-temporal modeling frame. The simplicity and flexibility make CA able to simulate a...
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can violate a system's security policy leading to unintended information flow. Execution monitor (EM) enforceability is the concept of monitoring a system during runtime for any security policy violations and terminating the execution...
The railway transportation safety system is a complex dynamic system with spatio-temporal characteristics. Taking railway line section as the research object, we propose a new cellular automation (CA) model - a safety system model for railway (SSM-R) - to simulate the railway safety. In the proposed CA model, we consider a railway line section as a cell and the neighbouring sections as the neighbors,...
We algebraically characterize a class of enforceable security policies by execution monitoring using a modal logic. We regard monitors as processes in Milnerpsilas CCS and security policies as formulas in the modal logic. We show that a set of processes occurring in a monitor must be within the greatest fixed point for the formula, following Schneiderpsilas definition on execution monitors. We also...
Role Based Access Control (RBAC) is arguably the most common access control mechanism today due to its applicability at various levels of authorization in a system. Time varying nature of access control in RBAC administered systems is often implemented through Temporal-RBAC - an extension of RBAC in the temporal domain. In this paper, we propose an initial approach towards verification of security...
This paper introduces a new (t, n) secret sharing scheme for image encryption. The proposed method encrypts the secret image into two images as the same size of the original image, which one is the public image (called the encrypted image) and another is to be shared among n participants using a new secret sharing method based on the Shamir’s secret sharing. In the new secret sharing scheme, t (or...
The increased availability of mobile broadband connec- tions enables the expansion of software downloads to mobile devices. This leads to greater number of available services and a better utilisation of the computational power of mobile devices. The downside of this increased software availability is an increase in the possible attack vectors. One scenario is the misuse of resources, for example,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.