SlideShare a Scribd company logo
1 of 22
Download to read offline
Implementing Real-Time Transactional Security
Property using Timed Edit Automata
N.Rajamanickam and R.Nadarajan
PSG College of Technology
Coimbatore, India
nrm@mca.psgtech.ac.in
Agenda
Security Policy
Properties
Edit Automata
Timed Edit Automata
Market Policy
Conclusion
Security Policy

If a computer system is regarded as a state transition system, then
a security policy is a statement that partitions the states of the
system in to
set of authorized states
set of unauthorized states
Security Policy

A secure system is a system that starts in one of authorized state,
and cannot enter an unauthorized state
Security Policy

General purpose security policies
Application dependent and special purpose security policies
Properties enforced by Timed Edit Automata

Security Properties
Transactional Properties
Real-Time Properties
Security Property

A security property is a security policy, which could be enforceable
by any enforcement mechanism
Transactional Properties

Automicity
Consisitency
Isolation
Durability
Real-Time Properties

Bounded response
Minimal separation
Edit Automata

Edit automaton E is a four tuple (Q, A, q0 , δ) where
Q - countably infinite set of states
A - set of actions
q0 - start state
δ : Q × A → Q × (A ∪ {.}) is deterministic total
transition function
Execution

A finite execution α is a finite sequence of timed actions(action,
time pairs)
α = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . . ; ai : ti ; . . . ; an : tn
An infinite execution σ is an infinite sequence of timed actions
σ = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . .
Timed Edit Automata

Timed edit automaton is a six tuple (Q, A, q0 , C , δ, I ) where
Q - countably infinite set of control locations
A - set of actions
q0 - start control location
C - set of real valued clocks
δ : A∪{null}×Q×B(C )×U → A∪{null}×Q×2C ×U
is deterministic transition function
I : Q → B(C ) assigns clock constraints to control
locations
Transitions

TE-Delay is for the transition between two actions, if the
timed edit automaton is in the same control location
TE-Suppress-Insert suppresses the current action ai and
inserts the new action b
TE-Insert is a discrete transition without taking any input
action
TE-Suppress suppresses the current input action ai and inserts
no input action
TE-Null is a discrete transition without taking any input
action and without emitting any output action
Operational Semantics
Discrete Transitions

σ = ai : t i ; σ

δ(ai , q, g , u) = (b, q , r , u ) u ∈ g

u ∈ I (q)

u ∈ I (q )

b

(σ, q, u) − TE (σ , q , u )
→
(TE-Suppress-Insert)
δ(null, q, g , u) = (c, q , r , u )
c

u∈g

(σ, q, u) − TE (σ, q , u )
→

u ∈ I (q )

(TE-Insert)
Operational Semantics
Discrete Transitions

σ = ai : ti ; σ

δ(ai , q, g , u) = (null, q , r , u )

u∈g

u ∈ I (q)

u ∈ I (q )

null

(σ, q, u) − → TE (σ , q , u )
−
(TE-Suppress)
δ(null, q, g , u) = (null, q , r , u )
null

u∈g

(σ, q, u) − → TE (σ, q , u )
−

u ∈ I (q )

(TE-Null)
Operational Semantics

Delay Transitions
u ∈ I (q) u + d ∈ I (q)
(σ, q, u) − TE (σ, q, u + d)
→
d

(TE-Delay)
Timed Market Policy
Conclusion

Real-time transactional security property is a combination of
security property, real time property and transactional property
Timed market policy can be implemented by using timed edit
automaton
References I
R. Alur and D. Dill.
A theory of timed automata.
Theoritical Computer Science, 1994.
N. A.Lynch, R. Segala, and F. Vaandrager.
Hybrid i/o automata.
Information and Computation, pages 105–157, 2003.
J. Bengtsson and W. Yi.
Timed automata: Semantics, algorithms and tools.
In Lectures on Concurrency and Petri nets. Springer, 2004.
M. Bishop.
Computer Security: Art and Science.
Addison-Wesly, 2002.
M. Bishop and S. S. Venkatramanayya.
Introduction to computer Security.
Pearson Education, 2006.
F. B.Schneider.
Enforceable security policies.
ACM Transactions on Information and System Security, 2000.
S. Davidson, I. Lee, and V. Wolfie.
Timed atomic commitment.
IEEE Transactions on Computers, 1989.
R. Gupta, J. Haritsa, K. Ramamritham, and S.Seshadri.
Commit processing in distributed real-time database systems.
1996.
References II

J. R. Haritsa, K. Ramamritham, and R. Gupta.
The prompt real-time commit protocol.
IEEE Transactions on Parallel and Distributed Systems, 1999.
D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager.
Timed i/o automata: A mathematical framework for modeling and analyzing real-time systems.
2003.
D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager.
The theory of timed i/o automata.
2004.
J. Ligatti, L. Bauer, and D. Walker.
More enforceable security policies.
In Foundations of Computer Security Workshop, 2002.
J. Ligatti, L. Bauer, and D. Walker.
Edit automata: enforcement mechanism for run-time security policies.
International Journal of Information Security, 2005.
J. Ligatti, L. Bauer, and D. Walker.
Run-time enforcement of nonsafety policies.
ACM Transactions on Information and Systems Security, 2009.
Quries and Suggestions
Thank You

More Related Content

What's hot

Post_Number Systems_8.1.2
Post_Number Systems_8.1.2Post_Number Systems_8.1.2
Post_Number Systems_8.1.2Marc King
 
Post_Number Systems_8.1.1
Post_Number Systems_8.1.1Post_Number Systems_8.1.1
Post_Number Systems_8.1.1Marc King
 
Sets and disjoint sets union123
Sets and disjoint sets union123Sets and disjoint sets union123
Sets and disjoint sets union123Ankita Goyal
 
The Two Speeds of Object A and Object B
The Two Speeds of Object A and Object BThe Two Speeds of Object A and Object B
The Two Speeds of Object A and Object BAlex Lee
 
14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic Programming14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic ProgrammingNeeldhara Misra
 
AP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 PowerpointAP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 PowerpointMrreynon
 

What's hot (11)

Lecture11
Lecture11Lecture11
Lecture11
 
Post_Number Systems_8.1.2
Post_Number Systems_8.1.2Post_Number Systems_8.1.2
Post_Number Systems_8.1.2
 
Lecture13
Lecture13Lecture13
Lecture13
 
Post_Number Systems_8.1.1
Post_Number Systems_8.1.1Post_Number Systems_8.1.1
Post_Number Systems_8.1.1
 
Sets and disjoint sets union123
Sets and disjoint sets union123Sets and disjoint sets union123
Sets and disjoint sets union123
 
The Two Speeds of Object A and Object B
The Two Speeds of Object A and Object BThe Two Speeds of Object A and Object B
The Two Speeds of Object A and Object B
 
14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic Programming14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic Programming
 
Ap review total
Ap review totalAp review total
Ap review total
 
AP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 PowerpointAP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 Powerpoint
 
กลศาสตร์
กลศาสตร์กลศาสตร์
กลศาสตร์
 
Chap 1 corrections
Chap 1 correctionsChap 1 corrections
Chap 1 corrections
 

Similar to Implementing real-time transactional security property using timed edit automata

Implementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit AutomataImplementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit AutomataRajamanickam N
 
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersSecurity-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersXiao Qin
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...ijtsrd
 
Safety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdfSafety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdfPolytechnique Montréal
 
Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Kiminao Kogiso
 
Multisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsMultisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsSayed Abulhasan Quadri
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to AlgorithmsVenkatesh Iyer
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...nooriasukmaningtyas
 
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingIJMER
 
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMSHenry Muccini
 
Complexity Analysis
Complexity Analysis Complexity Analysis
Complexity Analysis Shaista Qadir
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEIJNSA Journal
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityDefconRussia
 
Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Cigdem Aslay
 

Similar to Implementing real-time transactional security property using timed edit automata (20)

Implementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit AutomataImplementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit Automata
 
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersSecurity-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...
 
Safety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdfSafety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdf
 
Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...
 
Multisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsMultisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applications
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to Algorithms
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
 
Extend sim 01
Extend sim 01Extend sim 01
Extend sim 01
 
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
 
Complexity Analysis
Complexity Analysis Complexity Analysis
Complexity Analysis
 
Ke3617561763
Ke3617561763Ke3617561763
Ke3617561763
 
Static Analysis and Verification of C Programs
Static Analysis and Verification of C ProgramsStatic Analysis and Verification of C Programs
Static Analysis and Verification of C Programs
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
 
Control system unit(1)
Control system unit(1)Control system unit(1)
Control system unit(1)
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software security
 
Dealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient IntelligenceDealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient Intelligence
 
Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...
 

Recently uploaded

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Implementing real-time transactional security property using timed edit automata

  • 1. Implementing Real-Time Transactional Security Property using Timed Edit Automata N.Rajamanickam and R.Nadarajan PSG College of Technology Coimbatore, India nrm@mca.psgtech.ac.in
  • 2. Agenda Security Policy Properties Edit Automata Timed Edit Automata Market Policy Conclusion
  • 3. Security Policy If a computer system is regarded as a state transition system, then a security policy is a statement that partitions the states of the system in to set of authorized states set of unauthorized states
  • 4. Security Policy A secure system is a system that starts in one of authorized state, and cannot enter an unauthorized state
  • 5. Security Policy General purpose security policies Application dependent and special purpose security policies
  • 6. Properties enforced by Timed Edit Automata Security Properties Transactional Properties Real-Time Properties
  • 7. Security Property A security property is a security policy, which could be enforceable by any enforcement mechanism
  • 10. Edit Automata Edit automaton E is a four tuple (Q, A, q0 , δ) where Q - countably infinite set of states A - set of actions q0 - start state δ : Q × A → Q × (A ∪ {.}) is deterministic total transition function
  • 11. Execution A finite execution α is a finite sequence of timed actions(action, time pairs) α = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . . ; ai : ti ; . . . ; an : tn An infinite execution σ is an infinite sequence of timed actions σ = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . .
  • 12. Timed Edit Automata Timed edit automaton is a six tuple (Q, A, q0 , C , δ, I ) where Q - countably infinite set of control locations A - set of actions q0 - start control location C - set of real valued clocks δ : A∪{null}×Q×B(C )×U → A∪{null}×Q×2C ×U is deterministic transition function I : Q → B(C ) assigns clock constraints to control locations
  • 13. Transitions TE-Delay is for the transition between two actions, if the timed edit automaton is in the same control location TE-Suppress-Insert suppresses the current action ai and inserts the new action b TE-Insert is a discrete transition without taking any input action TE-Suppress suppresses the current input action ai and inserts no input action TE-Null is a discrete transition without taking any input action and without emitting any output action
  • 14. Operational Semantics Discrete Transitions σ = ai : t i ; σ δ(ai , q, g , u) = (b, q , r , u ) u ∈ g u ∈ I (q) u ∈ I (q ) b (σ, q, u) − TE (σ , q , u ) → (TE-Suppress-Insert) δ(null, q, g , u) = (c, q , r , u ) c u∈g (σ, q, u) − TE (σ, q , u ) → u ∈ I (q ) (TE-Insert)
  • 15. Operational Semantics Discrete Transitions σ = ai : ti ; σ δ(ai , q, g , u) = (null, q , r , u ) u∈g u ∈ I (q) u ∈ I (q ) null (σ, q, u) − → TE (σ , q , u ) − (TE-Suppress) δ(null, q, g , u) = (null, q , r , u ) null u∈g (σ, q, u) − → TE (σ, q , u ) − u ∈ I (q ) (TE-Null)
  • 16. Operational Semantics Delay Transitions u ∈ I (q) u + d ∈ I (q) (σ, q, u) − TE (σ, q, u + d) → d (TE-Delay)
  • 18. Conclusion Real-time transactional security property is a combination of security property, real time property and transactional property Timed market policy can be implemented by using timed edit automaton
  • 19. References I R. Alur and D. Dill. A theory of timed automata. Theoritical Computer Science, 1994. N. A.Lynch, R. Segala, and F. Vaandrager. Hybrid i/o automata. Information and Computation, pages 105–157, 2003. J. Bengtsson and W. Yi. Timed automata: Semantics, algorithms and tools. In Lectures on Concurrency and Petri nets. Springer, 2004. M. Bishop. Computer Security: Art and Science. Addison-Wesly, 2002. M. Bishop and S. S. Venkatramanayya. Introduction to computer Security. Pearson Education, 2006. F. B.Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 2000. S. Davidson, I. Lee, and V. Wolfie. Timed atomic commitment. IEEE Transactions on Computers, 1989. R. Gupta, J. Haritsa, K. Ramamritham, and S.Seshadri. Commit processing in distributed real-time database systems. 1996.
  • 20. References II J. R. Haritsa, K. Ramamritham, and R. Gupta. The prompt real-time commit protocol. IEEE Transactions on Parallel and Distributed Systems, 1999. D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager. Timed i/o automata: A mathematical framework for modeling and analyzing real-time systems. 2003. D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager. The theory of timed i/o automata. 2004. J. Ligatti, L. Bauer, and D. Walker. More enforceable security policies. In Foundations of Computer Security Workshop, 2002. J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanism for run-time security policies. International Journal of Information Security, 2005. J. Ligatti, L. Bauer, and D. Walker. Run-time enforcement of nonsafety policies. ACM Transactions on Information and Systems Security, 2009.