Show simple item record

dc.contributor.author
Frau, Simone
dc.contributor.author
Torabi Dashti, Mohammad
dc.date.accessioned
2017-08-17T13:27:00Z
dc.date.available
2017-06-10T19:02:12Z
dc.date.available
2017-08-17T13:27:00Z
dc.date.issued
2010
dc.identifier.uri
http://hdl.handle.net/20.500.11850/69221
dc.identifier.doi
10.3929/ethz-a-006935684
dc.description.abstract
We propose a language for formal specification of serviceoriented architectures. The language supports the integrated specification of communication level events, policy level decisions, and the interaction between the two. We show that the reachability problem is decidable for a fragment of service-oriented architectures. The decidable fragment is well suited for specifying, and reasoning about, securitysensitive architectures. In the decidable fragment, the attacker controls the communication media. The policies of services are centered around the trust application and trust delegation rules, and can also express rbac systems with role hierarchy. The fragment is of immediate practical relevance: we have specified and verified a number of security-sensitive architectures stemming from the e-government domain.
en_US
dc.format
application/pdf
dc.language.iso
en
en_US
dc.publisher
ETH, Department of Computer Science
en_US
dc.rights.uri
http://rightsstatements.org/page/InC-NC/1.0/
dc.subject
SPEZIFIKATIONEN (SOFTWARE ENGINEERING)
en_US
dc.subject
VERIFICATION (SOFTWARE ENGINEERING)
en_US
dc.subject
DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS)
en_US
dc.subject
NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS)
en_US
dc.subject
NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME)
en_US
dc.subject
SPECIFICATIONS (SOFTWARE ENGINEERING)
en_US
dc.subject
VERIFIKATION (SOFTWARE ENGINEERING)
en_US
dc.subject
DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)
en_US
dc.title
Integrated Specification and Verification of Security Protocols and Policies
en_US
dc.type
Report
dc.rights.license
In Copyright - Non-Commercial Use Permitted
dc.date.published
2011
ethz.journal.title
Technical Report / ETH Zurich, Department of Computer Science
ethz.journal.volume
702
en_US
ethz.size
15 p.
en_US
ethz.code.ddc
DDC - DDC::0 - Computer science, information & general works::004 - Data processing, computer science
en_US
ethz.notes
Technical Reports D-INFK.
en_US
ethz.identifier.nebis
006935684
ethz.publication.place
Zürich
en_US
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03634 - Basin, David / Basin, David
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02150 - Dep. Informatik / Dep. of Computer Science::02660 - Institut für Informationssicherheit / Institute of Information Security::03634 - Basin, David / Basin, David
ethz.date.deposited
2017-06-10T19:04:35Z
ethz.source
ECOL
ethz.source
ECIT
ethz.identifier.importid
imp59366b1d4f59429265
ethz.identifier.importid
imp593650c7b4cd541704
ethz.ecolpid
eth:5185
ethz.ecitpid
pub:109747
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2017-07-25T19:10:48Z
ethz.rosetta.lastUpdated
2022-03-28T17:25:10Z
ethz.rosetta.exportRequired
true
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Integrated%20Specification%20and%20Verification%20of%20Security%20Protocols%20and%20Policies&rft.jtitle=Technical%20Report%20/%20ETH%20Zurich,%20Department%20of%20Computer%20Science&rft.date=2010&rft.volume=702&rft.au=Frau,%20Simone&Torabi%20Dashti,%20Mohammad&rft.genre=report&
 Search print copy at ETH Library

Files in this item

Thumbnail

Publication type

Show simple item record