{"title":"Application of formal analysis to enhancing trust in a complex grid-based operating system","authors":"B. Aziz","doi":"10.1145/2304656.2304663","DOIUrl":null,"url":null,"abstract":"This paper presents a case study in the application of formal modelling and verification techniques to a large-scale distributed operating system for Grids called XtreemOS. The process algebraic language of applied À-calculus is used to model one of the mutual authentication protocols in the XtreemOS trust model, and an associated tool called ProVerif is used to verify the data leakage and mutual authentication properties in the protocol. The results, beside enhancing the level of assurance of the protocol in a critical part of the system, contribute to better understanding of the level of detail in the protocol's specification hence enabling better implementation of the protocol.","PeriodicalId":199564,"journal":{"name":"International Symposium on Architecting Critical Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Symposium on Architecting Critical Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2304656.2304663","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a case study in the application of formal modelling and verification techniques to a large-scale distributed operating system for Grids called XtreemOS. The process algebraic language of applied À-calculus is used to model one of the mutual authentication protocols in the XtreemOS trust model, and an associated tool called ProVerif is used to verify the data leakage and mutual authentication properties in the protocol. The results, beside enhancing the level of assurance of the protocol in a critical part of the system, contribute to better understanding of the level of detail in the protocol's specification hence enabling better implementation of the protocol.