SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Implementing Real-Time Transactional Security
Property using Timed Edit Automata
N.Rajamanickam and R.Nadarajan
PSG College of Technology
Coimbatore, India
nrm@mca.psgtech.ac.in
Agenda
Security Policy
Properties
Edit Automata
Timed Edit Automata
Market Policy
Conclusion
Security Policy

If a computer system is regarded as a state transition system, then
a security policy is a statement that partitions the states of the
system in to
set of authorized states
set of unauthorized states
Security Policy

A secure system is a system that starts in one of authorized state,
and cannot enter an unauthorized state
Security Policy

General purpose security policies
Application dependent and special purpose security policies
Properties enforced by Timed Edit Automata

Security Properties
Transactional Properties
Real-Time Properties
Security Property

A security property is a security policy, which could be enforceable
by any enforcement mechanism
Transactional Properties

Automicity
Consisitency
Isolation
Durability
Real-Time Properties

Bounded response
Minimal separation
Edit Automata

Edit automaton E is a four tuple (Q, A, q0 , δ) where
Q - countably infinite set of states
A - set of actions
q0 - start state
δ : Q × A → Q × (A ∪ {.}) is deterministic total
transition function
Execution

A finite execution α is a finite sequence of timed actions(action,
time pairs)
α = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . . ; ai : ti ; . . . ; an : tn
An infinite execution σ is an infinite sequence of timed actions
σ = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . .
Timed Edit Automata

Timed edit automaton is a six tuple (Q, A, q0 , C , δ, I ) where
Q - countably infinite set of control locations
A - set of actions
q0 - start control location
C - set of real valued clocks
δ : A∪{null}×Q×B(C )×U → A∪{null}×Q×2C ×U
is deterministic transition function
I : Q → B(C ) assigns clock constraints to control
locations
Transitions

TE-Delay is for the transition between two actions, if the
timed edit automaton is in the same control location
TE-Suppress-Insert suppresses the current action ai and
inserts the new action b
TE-Insert is a discrete transition without taking any input
action
TE-Suppress suppresses the current input action ai and inserts
no input action
TE-Null is a discrete transition without taking any input
action and without emitting any output action
Operational Semantics
Discrete Transitions

σ = ai : t i ; σ

δ(ai , q, g , u) = (b, q , r , u ) u ∈ g

u ∈ I (q)

u ∈ I (q )

b

(σ, q, u) − TE (σ , q , u )
→
(TE-Suppress-Insert)
δ(null, q, g , u) = (c, q , r , u )
c

u∈g

(σ, q, u) − TE (σ, q , u )
→

u ∈ I (q )

(TE-Insert)
Operational Semantics
Discrete Transitions

σ = ai : ti ; σ

δ(ai , q, g , u) = (null, q , r , u )

u∈g

u ∈ I (q)

u ∈ I (q )

null

(σ, q, u) − → TE (σ , q , u )
−
(TE-Suppress)
δ(null, q, g , u) = (null, q , r , u )
null

u∈g

(σ, q, u) − → TE (σ, q , u )
−

u ∈ I (q )

(TE-Null)
Operational Semantics

Delay Transitions
u ∈ I (q) u + d ∈ I (q)
(σ, q, u) − TE (σ, q, u + d)
→
d

(TE-Delay)
Timed Market Policy
Conclusion

Real-time transactional security property is a combination of
security property, real time property and transactional property
Timed market policy can be implemented by using timed edit
automaton
References I
R. Alur and D. Dill.
A theory of timed automata.
Theoritical Computer Science, 1994.
N. A.Lynch, R. Segala, and F. Vaandrager.
Hybrid i/o automata.
Information and Computation, pages 105–157, 2003.
J. Bengtsson and W. Yi.
Timed automata: Semantics, algorithms and tools.
In Lectures on Concurrency and Petri nets. Springer, 2004.
M. Bishop.
Computer Security: Art and Science.
Addison-Wesly, 2002.
M. Bishop and S. S. Venkatramanayya.
Introduction to computer Security.
Pearson Education, 2006.
F. B.Schneider.
Enforceable security policies.
ACM Transactions on Information and System Security, 2000.
S. Davidson, I. Lee, and V. Wolfie.
Timed atomic commitment.
IEEE Transactions on Computers, 1989.
R. Gupta, J. Haritsa, K. Ramamritham, and S.Seshadri.
Commit processing in distributed real-time database systems.
1996.
References II

J. R. Haritsa, K. Ramamritham, and R. Gupta.
The prompt real-time commit protocol.
IEEE Transactions on Parallel and Distributed Systems, 1999.
D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager.
Timed i/o automata: A mathematical framework for modeling and analyzing real-time systems.
2003.
D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager.
The theory of timed i/o automata.
2004.
J. Ligatti, L. Bauer, and D. Walker.
More enforceable security policies.
In Foundations of Computer Security Workshop, 2002.
J. Ligatti, L. Bauer, and D. Walker.
Edit automata: enforcement mechanism for run-time security policies.
International Journal of Information Security, 2005.
J. Ligatti, L. Bauer, and D. Walker.
Run-time enforcement of nonsafety policies.
ACM Transactions on Information and Systems Security, 2009.
Quries and Suggestions
Thank You

Contenu connexe

Tendances

Post_Number Systems_8.1.2
Post_Number Systems_8.1.2Post_Number Systems_8.1.2
Post_Number Systems_8.1.2Marc King
 
Post_Number Systems_8.1.1
Post_Number Systems_8.1.1Post_Number Systems_8.1.1
Post_Number Systems_8.1.1Marc King
 
Sets and disjoint sets union123
Sets and disjoint sets union123Sets and disjoint sets union123
Sets and disjoint sets union123Ankita Goyal
 
The Two Speeds of Object A and Object B
The Two Speeds of Object A and Object BThe Two Speeds of Object A and Object B
The Two Speeds of Object A and Object BAlex Lee
 
14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic Programming14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic ProgrammingNeeldhara Misra
 
AP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 PowerpointAP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 PowerpointMrreynon
 

Tendances (11)

Lecture11
Lecture11Lecture11
Lecture11
 
Post_Number Systems_8.1.2
Post_Number Systems_8.1.2Post_Number Systems_8.1.2
Post_Number Systems_8.1.2
 
Lecture13
Lecture13Lecture13
Lecture13
 
Post_Number Systems_8.1.1
Post_Number Systems_8.1.1Post_Number Systems_8.1.1
Post_Number Systems_8.1.1
 
Sets and disjoint sets union123
Sets and disjoint sets union123Sets and disjoint sets union123
Sets and disjoint sets union123
 
The Two Speeds of Object A and Object B
The Two Speeds of Object A and Object BThe Two Speeds of Object A and Object B
The Two Speeds of Object A and Object B
 
14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic Programming14 - 08 Feb - Dynamic Programming
14 - 08 Feb - Dynamic Programming
 
Ap review total
Ap review totalAp review total
Ap review total
 
AP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 PowerpointAP Physics - Chapter 6 Powerpoint
AP Physics - Chapter 6 Powerpoint
 
กลศาสตร์
กลศาสตร์กลศาสตร์
กลศาสตร์
 
Chap 1 corrections
Chap 1 correctionsChap 1 corrections
Chap 1 corrections
 

Similaire à Implementing real-time transactional security property using timed edit automata

Implementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit AutomataImplementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit AutomataRajamanickam N
 
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersSecurity-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersXiao Qin
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...ijtsrd
 
Safety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdfSafety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdfPolytechnique Montréal
 
Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Kiminao Kogiso
 
Multisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsMultisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsSayed Abulhasan Quadri
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to AlgorithmsVenkatesh Iyer
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...nooriasukmaningtyas
 
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingIJMER
 
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMSHenry Muccini
 
Complexity Analysis
Complexity Analysis Complexity Analysis
Complexity Analysis Shaista Qadir
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEIJNSA Journal
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityDefconRussia
 
Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Cigdem Aslay
 

Similaire à Implementing real-time transactional security property using timed edit automata (20)

Implementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit AutomataImplementing Real-Time Transactional Security Property using Timed Edit Automata
Implementing Real-Time Transactional Security Property using Timed Edit Automata
 
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on ClustersSecurity-Aware Scheduling for Real-Time Parallel Applications on Clusters
Security-Aware Scheduling for Real-Time Parallel Applications on Clusters
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...
 
Safety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdfSafety Verification of Deep Neural Networks_.pdf
Safety Verification of Deep Neural Networks_.pdf
 
Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...Controller encryption using RSA public-key encryption scheme (Asian Control C...
Controller encryption using RSA public-key encryption scheme (Asian Control C...
 
Multisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applicationsMultisensor data fusion in object tracking applications
Multisensor data fusion in object tracking applications
 
Introduction to Algorithms
Introduction to AlgorithmsIntroduction to Algorithms
Introduction to Algorithms
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
 
Extend sim 01
Extend sim 01Extend sim 01
Extend sim 01
 
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
1ST DISIM WORKSHOP ON ENGINEERING CYBER-PHYSICAL SYSTEMS
 
Complexity Analysis
Complexity Analysis Complexity Analysis
Complexity Analysis
 
Ke3617561763
Ke3617561763Ke3617561763
Ke3617561763
 
Static Analysis and Verification of C Programs
Static Analysis and Verification of C ProgramsStatic Analysis and Verification of C Programs
Static Analysis and Verification of C Programs
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
 
Control system unit(1)
Control system unit(1)Control system unit(1)
Control system unit(1)
 
Georgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software securityGeorgy Nosenko - An introduction to the use SMT solvers for software security
Georgy Nosenko - An introduction to the use SMT solvers for software security
 
Dealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient IntelligenceDealing with the need for Infrastructural Support in Ambient Intelligence
Dealing with the need for Infrastructural Support in Ambient Intelligence
 
Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...Workload-aware materialization for efficient variable elimination on Bayesian...
Workload-aware materialization for efficient variable elimination on Bayesian...
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Implementing real-time transactional security property using timed edit automata

  • 1. Implementing Real-Time Transactional Security Property using Timed Edit Automata N.Rajamanickam and R.Nadarajan PSG College of Technology Coimbatore, India nrm@mca.psgtech.ac.in
  • 2. Agenda Security Policy Properties Edit Automata Timed Edit Automata Market Policy Conclusion
  • 3. Security Policy If a computer system is regarded as a state transition system, then a security policy is a statement that partitions the states of the system in to set of authorized states set of unauthorized states
  • 4. Security Policy A secure system is a system that starts in one of authorized state, and cannot enter an unauthorized state
  • 5. Security Policy General purpose security policies Application dependent and special purpose security policies
  • 6. Properties enforced by Timed Edit Automata Security Properties Transactional Properties Real-Time Properties
  • 7. Security Property A security property is a security policy, which could be enforceable by any enforcement mechanism
  • 10. Edit Automata Edit automaton E is a four tuple (Q, A, q0 , δ) where Q - countably infinite set of states A - set of actions q0 - start state δ : Q × A → Q × (A ∪ {.}) is deterministic total transition function
  • 11. Execution A finite execution α is a finite sequence of timed actions(action, time pairs) α = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . . ; ai : ti ; . . . ; an : tn An infinite execution σ is an infinite sequence of timed actions σ = a1 : t1 ; a2 : t2 ; a3 : t3 ; . . .
  • 12. Timed Edit Automata Timed edit automaton is a six tuple (Q, A, q0 , C , δ, I ) where Q - countably infinite set of control locations A - set of actions q0 - start control location C - set of real valued clocks δ : A∪{null}×Q×B(C )×U → A∪{null}×Q×2C ×U is deterministic transition function I : Q → B(C ) assigns clock constraints to control locations
  • 13. Transitions TE-Delay is for the transition between two actions, if the timed edit automaton is in the same control location TE-Suppress-Insert suppresses the current action ai and inserts the new action b TE-Insert is a discrete transition without taking any input action TE-Suppress suppresses the current input action ai and inserts no input action TE-Null is a discrete transition without taking any input action and without emitting any output action
  • 14. Operational Semantics Discrete Transitions σ = ai : t i ; σ δ(ai , q, g , u) = (b, q , r , u ) u ∈ g u ∈ I (q) u ∈ I (q ) b (σ, q, u) − TE (σ , q , u ) → (TE-Suppress-Insert) δ(null, q, g , u) = (c, q , r , u ) c u∈g (σ, q, u) − TE (σ, q , u ) → u ∈ I (q ) (TE-Insert)
  • 15. Operational Semantics Discrete Transitions σ = ai : ti ; σ δ(ai , q, g , u) = (null, q , r , u ) u∈g u ∈ I (q) u ∈ I (q ) null (σ, q, u) − → TE (σ , q , u ) − (TE-Suppress) δ(null, q, g , u) = (null, q , r , u ) null u∈g (σ, q, u) − → TE (σ, q , u ) − u ∈ I (q ) (TE-Null)
  • 16. Operational Semantics Delay Transitions u ∈ I (q) u + d ∈ I (q) (σ, q, u) − TE (σ, q, u + d) → d (TE-Delay)
  • 18. Conclusion Real-time transactional security property is a combination of security property, real time property and transactional property Timed market policy can be implemented by using timed edit automaton
  • 19. References I R. Alur and D. Dill. A theory of timed automata. Theoritical Computer Science, 1994. N. A.Lynch, R. Segala, and F. Vaandrager. Hybrid i/o automata. Information and Computation, pages 105–157, 2003. J. Bengtsson and W. Yi. Timed automata: Semantics, algorithms and tools. In Lectures on Concurrency and Petri nets. Springer, 2004. M. Bishop. Computer Security: Art and Science. Addison-Wesly, 2002. M. Bishop and S. S. Venkatramanayya. Introduction to computer Security. Pearson Education, 2006. F. B.Schneider. Enforceable security policies. ACM Transactions on Information and System Security, 2000. S. Davidson, I. Lee, and V. Wolfie. Timed atomic commitment. IEEE Transactions on Computers, 1989. R. Gupta, J. Haritsa, K. Ramamritham, and S.Seshadri. Commit processing in distributed real-time database systems. 1996.
  • 20. References II J. R. Haritsa, K. Ramamritham, and R. Gupta. The prompt real-time commit protocol. IEEE Transactions on Parallel and Distributed Systems, 1999. D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager. Timed i/o automata: A mathematical framework for modeling and analyzing real-time systems. 2003. D. K.Kaynar, N. A.Lynch, R. Segala, and F. Vaandrager. The theory of timed i/o automata. 2004. J. Ligatti, L. Bauer, and D. Walker. More enforceable security policies. In Foundations of Computer Security Workshop, 2002. J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanism for run-time security policies. International Journal of Information Security, 2005. J. Ligatti, L. Bauer, and D. Walker. Run-time enforcement of nonsafety policies. ACM Transactions on Information and Systems Security, 2009.