Application of Model Checking to AXML System's Security: A Case Study

An Active XML (AXML in short) has been developed to provide efficient data management and integration by allowing Web services calls to be embedded in XML document. AXML documents have new security issues due to the possibility of malicious documents and attackers. To solve this security problem, document-level security with embedded service calls has been proposed to overcome the limitation of traditional security protocols. The aim of this paper is to show how existing model checking technique, with CSP and FDR, used for traditional message-based security protocols, can be adapted to specify and verify AXML document-based security. To illustrate our approach, we present the framework for modelling and analyzing AXML document's security. Then, we demonstrate how this technique can be applied to analyze electronic patient record taken from [13]. Finally, we show the possible vulnerabilities due to delegated query and malicious service call.

[1]  Ioana Manolescu,et al.  Lazy query evaluation for Active XML , 2004, SIGMOD '04.

[2]  Bill Roscoe,et al.  Web Services Security: a preliminary study using Casper and FDR , 2004 .

[3]  C. A. R. Hoare,et al.  Communicating sequential processes , 1978, CACM.

[4]  Gavin Lowe,et al.  Fault-Preserving Simplifying Transformations for Security Protocols , 2001, J. Comput. Secur..

[5]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[6]  Andrew D. Gordon,et al.  TulaFale: A Security Tool for Web Services , 2003, FMCO.

[7]  A. W. Roscoe,et al.  On the Relationship Between Web Services Security and Traditional Protocols , 2005, MFPS.

[8]  Donald E. Eastlake,et al.  XML-Signature Syntax and Processing , 2001, RFC.

[9]  C. A. R. Hoare,et al.  Notes on Communicating Sequential Systems , 1986 .

[10]  Serge Abiteboul,et al.  An Electronic Patient Record "on Steroids": Distributed, Peer-to-Peer, Secure and Privacy-conscious , 2004, VLDB.

[11]  Serge Abiteboul,et al.  Active XML, Security and Access Control , 2004, SBBD.

[12]  Peter Y. A. Ryan,et al.  The modelling and analysis of security protocols: the csp approach , 2000 .

[13]  Gregorio Díaz,et al.  Application of Formal Methods to the Analysis of Web Services Security , 2005, EPEW/WS-FM.

[14]  Ioana Manolescu,et al.  A Framework for Distributed XML Data Management , 2006, EDBT.

[15]  Gavin Lowe,et al.  Casper: a compiler for the analysis of security protocols , 1997, Proceedings 10th Computer Security Foundations Workshop.

[16]  Michael Goldsmith,et al.  Modelling and analysis of security protocols , 2001 .

[17]  Nataraj Nagaratnam,et al.  Web Services Security ( WS-Security ) Version 1 . 0 05 April 2002 , 2002 .

[18]  Gavin Lowe Casper: a compiler for the analysis of security protocols , 1998 .

[19]  Mark O'Neill,et al.  Web Services Security , 2003 .