A formal framework to integrate timed security rules within a TEFSM-based system specification

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling of various system aspects expressed usually through different paradigms. In this paper, we propose to combine two modeling formalisms in order to express both functional and security timed requirements of a system. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security requirements specified in Nomad language. This language is well adapted to express security properties such as permissions, prohibitions and obligations with time considerations. The resulting secure model can be used for several purposes such as code generation, specification correctness proof, model checking or automatic test generation. In this paper, we applied our approach to a France Telecom( France Telecom is the main telecommunication company in France) Travel service in order to demonstrate its feasibility.

Original languageEnglish
Title of host publicationProceedings - 16th Asia-Pacific Software Engineering Conference, APSEC 2009
Pages489-496
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2009
Event16th Asia-Pacific Software Engineering Conference, APSEC 2009 - Penang, Malaysia
Duration: 1 Dec 20093 Dec 2009

Publication series

NameProceedings - Asia-Pacific Software Engineering Conference, APSEC
ISSN (Print)1530-1362

Conference

Conference16th Asia-Pacific Software Engineering Conference, APSEC 2009
Country/TerritoryMalaysia
CityPenang
Period1/12/093/12/09

Keywords

  • Formal methods
  • Nomad language
  • Test generation
  • Timed extended finite state machines

Fingerprint

Dive into the research topics of 'A formal framework to integrate timed security rules within a TEFSM-based system specification'. Together they form a unique fingerprint.

Cite this