Modelling dynamic opacity using Petri Nets with silent actions

18Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In a previous work, [1], we presented a Petri Net based framework in which various confidentiality properties may be expressed in terms of predicates over system state and abstraction mappings from the reachable states and transitions of the underlying Petri Net. Here we extend that work by generalising these mappings by allowing them to be state dependent. This provides a natural framework in which to model various situations of importance in security, for example key compromise and refresh, downgrading of secrecy labels and conditional anonymity. We also show how global changes in the abstraction mappings can be used to model how some secrecy requirements depend on the status of the observer. We illustrate this by modelling the various flavours of anonymity that arise in the dining cryptographers example. A further development on the earlier work is to provide a more complete treatment of silent actions. We also discuss the expressiveness of the resulting framework and the decidability of the associated verification problems. © 2005 by International Federation for Information Processing.

Cite

CITATION STYLE

APA

Bryans, J. W., Koutny, M., & Ryan, P. Y. A. (2005). Modelling dynamic opacity using Petri Nets with silent actions. In IFIP Advances in Information and Communication Technology (Vol. 173, pp. 159–172). Springer New York LLC. https://doi.org/10.1007/0-387-24098-5_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free