Modeling system security rules with time constraints using timed extended finite state machines

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite StateMachine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom1 Travel system as a case study to demonstrate the reliability of our framework.

Original languageEnglish
Title of host publicationProceedings - 12th 2008 IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2008
Pages173-180
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2008
Event12th 2008 IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2008 - Vancouver, BC, Canada
Duration: 27 Oct 200829 Oct 2008

Publication series

NameProceedings - 12th 2008 IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2008

Conference

Conference12th 2008 IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, DS-RT 2008
Country/TerritoryCanada
CityVancouver, BC
Period27/10/0829/10/08

Keywords

  • Nomad language
  • Security integration.
  • Security rules
  • Timed EFSM model

Fingerprint

Dive into the research topics of 'Modeling system security rules with time constraints using timed extended finite state machines'. Together they form a unique fingerprint.

Cite this