TEAR: A Multi-purpose Formal Language Specification for TEsting at Runtime

Collaborative systems are growing in use and in popularity. The need to boost the methods concerning the interoperability is growing as well, therefore, trustworthy interactions of the different systems are a priority. We have proposed a formal distributed network monitoring approach to analyze the packets exchanged by the entities, in order to prove a system is acting in a trustworthy manner. Using this approach, some limitations regarding the testers resources have been found. In this paper, we identify the constraints and propose and new language suited for testing at runtime in different environments.

[1]  Ana R. Cavalli,et al.  Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments , 2012, ICISS.

[2]  Vijay Varadharajan,et al.  A Hybrid Trust Model for Enhancing Security in Distributed Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[3]  Stephane Maag,et al.  Scalable evaluation of distributed on-line network monitoring for behavioral feedback in trust management , 2014 .

[4]  Christoph Meinel,et al.  A Flexible and Efficient Alert Correlation Platform for Distributed IDS , 2010, 2010 Fourth International Conference on Network and System Security.

[5]  Guy Pujolle,et al.  An autonomic knowledge monitoring scheme for trust management on mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[6]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  Jorge López,et al.  Behavior evaluation for trust management based on formal distributed network monitoring , 2015, World Wide Web.

[8]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[9]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[10]  Trevor Jim,et al.  SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[11]  Angelos D. Keromytis,et al.  Key note: Trust management for public-key infrastructures , 1999 .

[12]  Hassan Takabi,et al.  DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[13]  Jorge López,et al.  An online passive testing approach for communication protocols , 2014, 2014 9th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE).

[14]  Chi-Chun Lo,et al.  A Cooperative Intrusion Detection System Framework for Cloud Computing Networks , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[15]  David L. Mills,et al.  Internet time synchronization: the network time protocol , 1991, IEEE Trans. Commun..

[16]  John W. Backus,et al.  The syntax and semantics of the proposed international algebraic language of the Zurich ACM-GAMM Conference , 1959, IFIP Congress.

[17]  Wissam Mallouli,et al.  Online Network Traffic Security Inspection Using MMT Tool , 2012 .

[18]  Jorge López,et al.  A formal distributed network monitoring approach for enhancing trust management systems , 2013, MEDES.

[19]  Marianne Winslett,et al.  TrustBuilder2: A Reconfigurable Framework for Trust Negotiation , 2009, IFIPTM.