Run-time security evaluation (RTSE) for distributed applications

Formal security specifications for a distributed application can be checked for compliance at run-time using executable security assertions. We propose the run-time security evaluation (RTSE) method which makes use of histories/traces of events, assertions and operational evaluation in the distributed environment to ensure the security specifications for the application are fulfilled at run-time. A model problem is used to aid in developing the security requirements formally.

[1]  Mukesh Singhal,et al.  Advanced Concepts In Operating Systems , 1994 .

[2]  Catherine Meadows The Need for a Failure Model for Security , 1995 .

[3]  John Rushby,et al.  Critical system properties: survey and taxonomy , 1994 .

[5]  Bruce M. McMillin,et al.  A General Method for Maximizing the Error-Detecting Ability of Distributed Algorithms , 1994, PARLE.

[6]  Alfonso Valdes,et al.  Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .

[7]  Flaviu Cristian,et al.  Systematic Detection of Exception Occurrences , 1981, Sci. Comput. Program..

[8]  Flaviu Cristian Robust Data Types , 1981, Program Specification.

[9]  HANAN LUTFIYYA,et al.  Ccsp -a Formal System for Distributed Program Debugging , .

[10]  Colin O'Halloran On requirements and security in a CCIS , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.

[11]  Bowen Alpern,et al.  Defining Liveness , 1984, Inf. Process. Lett..

[12]  C. A. R. Hoare,et al.  Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.

[13]  Arthur J. Bernstein,et al.  Efficient solutions to the replicated log and dictionary problems , 1984, PODC '84.

[14]  Bruce M. McMillin,et al.  A General Method for Maximizing the Error-Detecting Ability of Distributed Algorithms , 1994, IEEE Trans. Parallel Distributed Syst..

[15]  John McLean,et al.  A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.