Title :
Security analysis of a token ring using Ulysses
Author :
McCullough, Daryl
Author_Institution :
Odyssey Res. Associates Inc., Ithaca, NY, USA
Abstract :
The Ulysses security modeling environment and methodology is illustrated by using a secure token ring network as an example. It is shown that by using a flow analyzer and a library of preproved components, it is possible to decompose the functionality of a system and to determine which components have possible security flaws. The analysis also highlights the issue of tradeoffs between requirements on systems. It is often the case that in order to achieve a high degree of security for a system it is necessary to implement measures which decrease its performance. For this reason, it is important to be able to quickly determine the security flaws of a system at the level of design, as Ulysses does, so that the relative benefits and disadvantages of design decisions can be weighed before they are implemented
Keywords :
security of data; token networks; Ulysses security modeling environment; decompose; flow analyzer; library; performance; preproved components; secure token ring network; security analysis; security flaws; tradeoffs; Contracts; Data security; Formal specifications; Information analysis; Information security; Libraries; Optical fiber cables; Optical fibers; Protocols; Token networks;
Conference_Titel :
Computer Assurance, 1989. COMPASS '89, 'Systems Integrity, Software Safety and Process Security', Proceedings of the Fourth Annual Conference on
Conference_Location :
Gaithersburg, MD
DOI :
10.1109/CMPASS.1989.76049