DocumentCode :
3598215
Title :
Command center security-proving software correct
Author :
Hammonds, Grace L. ; Lichota, Randall W. ; Hird, G. ; Wool, Jack
Author_Institution :
AGCS Inc., Stoneham, MA, USA
fYear :
1995
Firstpage :
163
Lastpage :
173
Abstract :
Many command center operations require the ability to process and safeguard information derived from multiple sources, often over wide geographical areas and from different security environments. Thus in the development or upgrade of a command center one may need to address a number of security issues such as confidentiality, authentication, availability, and integrity of data. This paper discusses how formal methods can be used to prove correctness of two command center security services: network security in relation to authentication protocols; and the automated transfer of data between separate systems operating at different security levels (i.e., guard systems). The proof process is supported by a collection of tools which constitute the Romulus Security Modeling Environment. To specify and analyze authentication protocols we use a formalism known as belief logic. We show how this can be used to specify and address aspects of confidentiality, authentication, integrity, and key distribution in the Kerberos Authentication protocol. We also discuss how belief logic can be used in conjunction with a process model formalism to reason about security in guards
Keywords :
data integrity; message authentication; program verification; protocols; Romulus Security Modeling Environment; authentication; authentication protocols; availability; belief logic; command center security; confidentiality; data integrity; formal methods; network security; process model formalism; security environments; software correctness proving; Access control; Authentication; Data security; Information security; Information systems; Lifting equipment; Logic; Multilevel systems; Protocols; Wool;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Assurance, 1995. COMPASS '95. Systems Integrity, Software Safety and Process Security. Proceedings of the Tenth Annual Conference on
Print_ISBN :
0-7803-2680-2
Type :
conf
DOI :
10.1109/CMPASS.1995.521895
Filename :
521895
Link To Document :
بازگشت