The modeling and analysis of security properties in large and complex networked systems is more and more demanding for the availability of computer-assisted software tools able to help designers and engineers in describing and verifying their systems in an easy way. Indeed, on the one hand these tasks are usually cumbersome and error-prone when carried out manually, while on the other hand they have to be repeated during the whole system lifetime, starting with its conception and deployment and ending with the system final disposal. This paper presents a semi-automated framework which is conceived for the fine-grained description of networked systems from the security point of view. In particular, the paper shows how a simple graphical user interface allows the designer to largely ignore the syntax of the input language for the analysis tool and focus only on the implemented system characteristics.

A Semi-Graphical Modeling Framework for the Automated Analysis of Networked Systems Security

M Cheminod;L Durante;M Maggiora;L Seno;A Valenzano
2015

Abstract

The modeling and analysis of security properties in large and complex networked systems is more and more demanding for the availability of computer-assisted software tools able to help designers and engineers in describing and verifying their systems in an easy way. Indeed, on the one hand these tasks are usually cumbersome and error-prone when carried out manually, while on the other hand they have to be repeated during the whole system lifetime, starting with its conception and deployment and ending with the system final disposal. This paper presents a semi-automated framework which is conceived for the fine-grained description of networked systems from the security point of view. In particular, the paper shows how a simple graphical user interface allows the designer to largely ignore the syntax of the input language for the analysis tool and focus only on the implemented system characteristics.
2015
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
978-1-4673-8166-6
Role-based access control (RBAC)
network security
automated analysis
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/307770
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact