A systematic approach to integrate common timed security rules within a TEFSM-based system specification

Research output: Contribution to journalArticlepeer-review

Abstract

Context: Formal methods are very useful in the software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and modeling of various system aspects expressed usually through different paradigms. These different formalisms make the verification of global developed systems more difficult. Objective: In this paper, we propose to combine two modeling formalisms, in order to express both functional and security timed requirements of a system to obtain all the requirements expressed in a unique formalism. Method: First, the system behavior is specified according to its functional requirements using Timed Extended Finite State Machine (TEFSM) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security requirements specified in Nomad language. This language is adapted to express security properties such as permissions, prohibitions and obligations with time considerations. Results: The proposed algorithms produce a global TEFSM specification of the system that includes both its functional and security timed requirements. Conclusion: It is concluded that it is possible to merge several requirement aspects described with different formalisms into a global specification that can be used for several purposes such as code generation, specification correctness proof, model checking or automatic test generation. In this paper, we applied our approach to a France Telecom Travel service to demonstrate its scalability and feasibility.

Original languageEnglish
Pages (from-to)87-98
Number of pages12
JournalInformation and Software Technology
Volume54
Issue number1
DOIs
Publication statusPublished - 1 Jan 2012

Keywords

  • Formal methods
  • Nomad language
  • Test generation
  • Timed extended finite state machines

Fingerprint

Dive into the research topics of 'A systematic approach to integrate common timed security rules within a TEFSM-based system specification'. Together they form a unique fingerprint.

Cite this