Limits for automatic verification of finite-state concurrent systems
Information Processing Letters
Reasoning about networks with many identical finite state processes
Information and Computation
A structural induction theorem for processes
Proceedings of the eighth annual ACM Symposium on Principles of distributed computing
Verifying properties of large sets of processes with network invariants
Proceedings of the international workshop on Automatic verification methods for finite state systems
Handbook of theoretical computer science (vol. B)
Reasoning about systems with many processes
Journal of the ACM (JACM)
Symbolic model checking: 1020 states and beyond
Information and Computation - Special issue: Selections from 1990 IEEE symposium on logic in computer science
Verifying parameterized networks
ACM Transactions on Programming Languages and Systems (TOPLAS)
Condor: a distributed job scheduler
Beowulf cluster computing with Linux
Condor-G: A Computation Management Agent for Multi-Institutional Grids
Cluster Computing
Automatic Verification of Parameterized Synchronous Systems (Extended Abstract)
CAV '96 Proceedings of the 8th International Conference on Computer Aided Verification
Reducing Model Checking of the Many to the Few
CADE-17 Proceedings of the 17th International Conference on Automated Deduction
ACM SIGOPS Operating Systems Review
CSP and determinism in security modelling
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
APSS: proactive secret sharing in asynchronous systems
ACM Transactions on Information and System Security (TISSEC)
Grid Computing Security
Specification-correct and scalable coordination of Grid applications
Future Generation Computer Systems
Grid Computing Security: A Taxonomy
IEEE Security and Privacy
Verification of parametric concurrent systems with prioritised FIFO resource management
Formal Methods in System Design
Formal Verification of a Grid Resource Allocation Protocol
CCGRID '08 Proceedings of the 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
A mechanism for grid service composition behavior specification and verification
Future Generation Computer Systems
Proving ptolemy right: the environment abstraction framework for model checking concurrent systems
TACAS'08/ETAPS'08 Proceedings of the Theory and practice of software, 14th international conference on Tools and algorithms for the construction and analysis of systems
A cut-off approach for bounded verification of parameterized systems
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
A reference model for grid architectures and its validation
Concurrency and Computation: Practice & Experience - Grid Computing, High Performance and Distributed Application
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Towards the Semi-Automatic Verification of Parameterized Real-Time Systems Using Network Invariants
SEFM '10 Proceedings of the 2010 8th IEEE International Conference on Software Engineering and Formal Methods
Automating cut-off for multi-parameterized systems
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Verifying a delegation protocol for grid systems
Future Generation Computer Systems
Future Generation Computer Systems
Secure information flow as a safety problem
SAS'05 Proceedings of the 12th international conference on Static Analysis
On the security of public key protocols
IEEE Transactions on Information Theory
Model checking and abstraction to the aid of parameterized systems (a survey)
Computer Languages, Systems and Structures
Formal methods for cryptographic protocol analysis: emerging issues and trends
IEEE Journal on Selected Areas in Communications
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
Hi-index | 0.00 |
Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a ''cutoff'' theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.