Theoretical Computer Science
Automated Generation of Statistical Test Cases from UML State Diagrams
COMPSAC '01 Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development
Hit-or-Jump: An algorithm for embedded testing with applications to IN services
FORTE XII / PSTV XIX '99 Proceedings of the IFIP TC6 WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (FORTE XII) and Protocol Specification, Testing and Verification (PSTV XIX)
Formal Methods for Conformance Testing: Results and Perspectives
Proceedings of the IFIP TC6/WG6.1 Sixth International Workshop on Protocol Test systems VI
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
A Compositional Approach for Designing Multifunction Time-Dependent Protocols
ICNP '97 Proceedings of the 1997 International Conference on Network Protocols (ICNP '97)
Nomad: A Security Model with Non Atomic Actions and Deadlines
CSFW '05 Proceedings of the 18th IEEE workshop on Computer Security Foundations
A formal approach for testing security rules
Proceedings of the 12th ACM symposium on Access control models and technologies
High Level Conflict Management Strategies in Advanced Access Control Models
Electronic Notes in Theoretical Computer Science (ENTCS)
Test Generation from Security Policies Specified in Or-BAC
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 02
Two Complementary Tools for the Formal Testing of Distributed Systems with Time Constraints
DS-RT '08 Proceedings of the 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications
Information and Software Technology
Hi-index | 0.00 |
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In this paper, we propose a framework to take timed security requirements into account from the design stage of the system building. Our approach consists of two main steps. First, the system behavior is specified based on its functional requirements using TEFSM (Timed Extended Finite State Machine) formalism. Second, this model is augmented by applying a set of dedicated algorithms to integrate timed security properties specified in Nomad language. Nomad is a formal language well adapted to express timed security properties with timed constraints. We also briefly present a France Telecom Travel system as a case study to demonstrate the reliability of our framework.