Advertisement

A Survey on Non-interference with Petri Nets

  • Nadia Busi
  • Roberto Gorrieri
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3098)

Abstract

Several notions of non-interference have been proposed in the literature to study the problem of confidentiality in nondeterministic and concurrent systems. Here we rephrase some of them – notably SNNI and BNDC – over the model of safe Place/Transition Petri Nets. The common feature of these non-interference properties is that they are all defined as extensional properties based on some notion of behavioural equivalence on systems. Here we also address the problem of defining non-interference by looking at the structure of the net systems under investigation. We define structural non-interference properties based on the absence of particular places in the net. We characterize structural properties that are slight refinement of well-known properties such as SNNI and SBNDC. We then argue that, in order to capture all the intuitive interferences at the structural level, it is necessary to consider the net originated by the region construction, yielding the property RBNI we advocate.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Badouel, E., Darondeau, P.: Theory of regions. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol. 1491, pp. 529–586. Springer, Heidelberg (1998)Google Scholar
  2. 2.
    Desel, J., Reisig, W.: The synthesis problem of Petri nets. Acta Informatica 33, 296–315 (1996)CrossRefMathSciNetGoogle Scholar
  3. 3.
    Degano, P., De Nicola, R., Montanari, U.: A Distributed Operational Semantics for CCS based on C/E Systems. Acta Informatica 26, 59–91 (1988)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Ehrenfeucht, A., Rozenberg, G.: Partial (set) 2-structures; I and II. Acta Informatica 27, 315–368 (1990)zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Engelfriet, J., Rozenberg, G.: Elementary Net Systems. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol. 1491. Springer, Heidelberg (1998)Google Scholar
  6. 6.
    Focardi, R., Gorrieri, R.: A Classification of Security Properties. Journal of Computer Security 3(1), 5–33 (1995)Google Scholar
  7. 7.
    Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331–396. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Goguen, J.A., Meseguer, J.: Security Policy and Security Models. In: Proc. of Symposium on Security and Privacy, pp. 11–20. IEEE CS Press, Los Alamitos (1982)Google Scholar
  9. 9.
    Petri, C.A.: Kommunikation mit Automaten, PhD Thesis, Institut für Instrumentelle Mathematik, Bonn, Germany (1962)Google Scholar
  10. 10.
    Reisig, W.: Petri Nets: An Introduction. EATCS Monographs in Computer Science. Springer, Heidelberg (1985)zbMATHGoogle Scholar
  11. 11.
    Roscoe, A.W.: CSP and Determinism in Security Modelling. In: Proc. of IEEE Symposium on Security and Privacy, pp. 114–127. IEEE CS Press, Los Alamitos (1995)Google Scholar
  12. 12.
    Ryan, P.Y.A.: Mathematical Models of Computer Security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 1–62. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  13. 13.
    Ryan, P.Y.A., Schneider, S.: Process Algebra and Noninterference. In: Proc. of 12th Computer Security Foundations Workshop, pp. 214–227. IEEE CS Press, Los Alamitos (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Nadia Busi
    • 1
  • Roberto Gorrieri
    • 1
  1. 1.Dipartimento di Scienze dell’InformazioneUniversità di BolognaBolognaItaly

Personalised recommendations