One Picture is Worth a Thousand Words
Iliano Cervesato
iliano@itd.nrl.navy.mil
ITT Industries, inc @ NRL Washington, DC
http://theory.stanford.edu/~iliano
ONR IPCS meeting September 23-25, 2003
Joint work with Cathy Meadows
Harpers Ferry, WV
One Picture is Worth a Thousand Words Couple Dozen Connectives - - PowerPoint PPT Presentation
Work in progress Work in progress One Picture is Worth a Thousand Words Couple Dozen Connectives Iliano Cervesato iliano@itd.nrl.navy.mil ITT Industries, inc @ NRL Washington, DC http://theory.stanford.edu/~iliano Joint work with Cathy
iliano@itd.nrl.navy.mil
http://theory.stanford.edu/~iliano
ONR IPCS meeting September 23-25, 2003
Harpers Ferry, WV
Fault Tree Representation of Security Requirements 1
– Dozen operators
Fault Tree Representation of Security Requirements 2
Fault Tree Representation of Security Requirements 3
[CSFW’02]
Fault Tree Representation of Security Requirements 4
[CCS’01]
Fault Tree Representation of Security Requirements 5
[Lowe, CSFW’97]
Fault Tree Representation of Security Requirements 6
Fault Tree Representation of Security Requirements 7
Fault Tree Representation of Security Requirements 8
Fault Tree Representation of Security Requirements 9
Fault Tree Representation of Security Requirements 10
Fault Tree Representation of Security Requirements 11
Fault Tree Representation of Security Requirements 12
Fault Tree Representation of Security Requirements 13
name actuator
terms round
Fault Tree Representation of Security Requirements 14
R ::= a F F ::= E | ¬E | F1 ∧ F2 | F1 ∨ F2 E ::= #a | #(a ∧ F)
Fault Tree Representation of Security Requirements 15
canBoard hasTicket carriesWeapon hasID
Fault Tree Representation of Security Requirements 16
Fault Tree Representation of Security Requirements 17
member_accept_key(M,G,(KGM ,Kold ),N)
#
gcks_loseparwisekey(G,(),(M,KGM ),_) ∨ ¬(# ( member_requestkey(M,G,(),N) ∧
#gcks_createkey(G,(),Knew
,Kold ),_)))
Fault Tree Representation of Security Requirements 18
member_accept_key(M,G,(KGM ,Kold ),_)
#
gcks_loseparwisekey(G,(),(M,KGM ),_) ∨ ¬(# (member_acceptkey(M,G,(KGM ,Knew ),_) ∧
#(gcks_createkey(G,(),Knew
,K’),_) ∧
#gcks_createkey(G,(),Kold
,K’’),_))))
Fault Tree Representation of Security Requirements 19
Fault Tree Representation of Security Requirements 20
Fault Tree Representation of Security Requirements 21