کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
4945988 1364077 2017 23 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Intruder deducibility constraints with negation. Decidability and application to secured service compositions
ترجمه فارسی عنوان
محدودیت پذیری درگیر با نفی تصمیم گیری و کاربرد در ساختار سرویس ایمن
کلمات کلیدی
خدمات وب، تنظیم و ارکستراسیون، راهبرد امنیتی، جداسازی وظیفه، محدودیت های تخفیف، پروتکل رمزنگاری، روش های رسمی، تأیید خودکار، سنتز،
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر هوش مصنوعی
چکیده انگلیسی
We consider a problem of automated orchestration of security-aware services under additional constraints. The problem of finding a mediator to compose secured services has been reduced in previous works to the problem of solving deducibility constraints similar to those employed for cryptographic protocol analysis. We extend in this paper the mediator synthesis procedure (i.e. a solution for the orchestration problem) by allowing additional non-disclosure policies that express the fact that some data is not accessible to the mediator at a given point of its execution. We present a decision procedure that answers the question whether a mediator satisfying these policies can be effectively synthesized. The approach presented in this work extends the constraint solving procedure for cryptographic protocol analysis in a significant way as to be able to handle negation of deducibility constraints. It applies to all subterm convergent theories and therefore covers several interesting theories in formal security analysis including encryption, hashing, signature and pairing; it is also expressive enough for some RBAC policies. A variant of this procedure for Dolev Yao theory has been implemented in Cl-Atse, a protocol analysis tool based on constraint solving.
ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Symbolic Computation - Volume 80, Part 1, May–June 2017, Pages 4-26
نویسندگان
, , , ,