Analyzing network management effects with spin and ctla

3Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Since many security incidents of networked computing infrastructures arise from inadequate technical management actions, we aim at a method supporting the formal analysis of those implications which administration activities rnay have towards system security. We apply the specification language cTLA which supports the modular description ofprocess systems and facilitates the construction of a modeling framework. The framework defines a generic modeling structure and provides re-usable model elements. Due to cTLA's connection to the temporal logic of actions TLA, formal analysis can resort to symbolic reasoning. Supplementarily, automated analysis can be applied. We focus here on automated analysis. It is supported by translation of cTLA specifications into suitable model descriptions for the powernd model checking tool SPIN. We outline the utilized methods and tools, and report on the modeling and SPIN-based analysis of IP-Hijacking. © 2004 by Springer Science+Business Media Dordrecht.

Cite

CITATION STYLE

APA

Rothmaier, G., Pohl, A., & Krumm, H. (2004). Analyzing network management effects with spin and ctla. In IFIP Advances in Information and Communication Technology (Vol. 147, pp. 65–81). Springer New York LLC. https://doi.org/10.1007/1-4020-8143-x_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free