Non-Interference Notions Based on Reveals and Excludes Relations for Petri Nets

We introduce two families of relations on the transitions of a Petri net. The first one is an adaptation of the “reveals” relation previously defined on occurrence nets for fault diagnosis applications. Here, this relation is considered for modeling positive information flow, which arises when the occurrence of a transition gives the information that another transition already occurred or will occur. The second one, called “excludes”, is presented for modeling negative information flow, which arises when the occurrence of a transition gives information on the non-occurrence of another transition, in the past or in the future. We consider the notion of non-interference proposed in the literature for formalizing security in distributed systems. On the basis of reveals and excludes relations we propose a collection of new notions of non-interference for ordinary Petri nets and compare them with notions already proposed in the literature.

[1]  Roberto Gorrieri,et al.  On the Decidability of Non Interference over Unbounded Petri Nets , 2010, SecCo.

[2]  Stefan Haar,et al.  Reveal Your Faults: It's Only Fair! , 2013, 2013 13th International Conference on Application of Concurrency to System Design.

[3]  Philippe Darondeau,et al.  Deciding Selective Declassification of Petri Nets , 2012, POST.

[4]  Roberto Gorrieri,et al.  On Intransitive Non-interference in Some Models of Concurrency , 2011, FOSAD.

[5]  Steve A. Schneider,et al.  CSP and Anonymity , 1996, ESORICS.

[6]  Roberto Gorrieri,et al.  Positive Non-interference in Elementary and Trace Nets , 2004, ICATPN.

[7]  John Rushby,et al.  Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .

[8]  A. W. Roscoe CSP and determinism in security modelling , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[9]  Thomas Chatain,et al.  Building Tight Occurrence Nets from Reveals Relations , 2011, 2011 Eleventh International Conference on Application of Concurrency to System Design.

[10]  Peter Kuster Foundations Of Security Analysis And Design Tutorial Lectures , 2016 .

[11]  Peter Y. A. Ryan,et al.  Process algebra and non-interference , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.

[12]  Joost Engelfriet,et al.  Branching processes of Petri nets , 1991, Acta Informatica.

[13]  J. Meseguer,et al.  Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.

[14]  Peter Y. A. Ryan,et al.  Mathematical Models of Computer Security , 2000, FOSAD.

[15]  Roberto Gorrieri,et al.  A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..

[16]  Thomas Chatain,et al.  Building Occurrence Nets from Reveals Relations , 2013, Fundam. Informaticae.

[17]  Roberto Gorrieri,et al.  A Survey on Non-interference with Petri Nets , 2003, Lectures on Concurrency and Petri Nets.

[18]  Stefan Haar Unfold and cover: Qualitative diagnosability for Petri Nets , 2007, 2007 46th IEEE Conference on Decision and Control.

[19]  Laurent Mazare,et al.  Using Unification For Opacity Properties , 2004 .

[20]  Roberto Gorrieri,et al.  Classification of Security Properties (Part I: Information Flow) , 2000, FOSAD.

[21]  Maciej Koutny,et al.  Opacity generalised to transition systems , 2005, International Journal of Information Security.

[22]  Alberto Carraro,et al.  Non-interference by Unfolding , 2014, Petri Nets.

[23]  Roberto Gorrieri,et al.  A Classification of Security Properties , 1993 .

[24]  Maciej Koutny,et al.  Modelling Opacity Using Petri Nets , 2005, WISP@ICATPN.