2009
DOI: 10.1007/978-3-642-01465-9_14
|View full text |Cite
|
Sign up to set email alerts
|

Petri Net Security Checker: Structural Non-interference at Work

Abstract: Abstract. Structural non-interference is a semi-static technique defined over Petri nets to check the absence of illegal information flows. This paper presents the main algorithmic features of this new technique and its implementation in a software tool, called the Petri Net Security Checker.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…As a formal tool with rigorous semantics, Petri net can be efficiently used to model and verify the security properties of system models [4][5][6][7].…”
Section: Petri Netmentioning
confidence: 99%
See 2 more Smart Citations
“…As a formal tool with rigorous semantics, Petri net can be efficiently used to model and verify the security properties of system models [4][5][6][7].…”
Section: Petri Netmentioning
confidence: 99%
“…One better approach to information flow security is to control both the direct and indirect information flow by applying some information flow rules [6], which are called information flow security models, such as noninterference security model discussed in this paper.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of Petri nets has three advantages: first, it provides a uniform, language-independent model for analysis [21]; second, it allows the formalization of structural IF properties as Petri net patterns [8] (see §3); and third, it provides a sound basis for the formal IF analysis, which boils down to determining whether a Petri net encompasses a harmful pattern [15]. In particular, both the transformation of processes into Petri nets and the IF analysis are largely automated, thereby accelerating the certification process considerably.…”
Section: Introductionmentioning
confidence: 99%
“…Second, it allows the well-founded formalization of structural isolation properties as Petri net patterns [7]. Third, it provides a sound basis for efficient isolation analysis, which reduces to determining whether or not a Petri net encompasses a leak pattern [11]. Moreover, the graphical notation and similarity with business process specifications renders the approach practical for enterprise forensics.…”
Section: Introductionmentioning
confidence: 99%