|
Trudy SPIIRAN, 2013, Issue 30, Pages 246–257
(Mi trspy685)
|
|
|
|
A technique for verification of network information flows in information and telecommunication systems with embedded devices
V. Desnitsky St. Petersburg Institute for Informatics and Automation of RAS
Abstract:
The paper comprises a technique of information flow verification for information and telecommunication systems with embedded devices. The goal of the technique is to evaluate the security level of the constructed system and check the compliance between real infor-mation flows and the set policies. The conducted verification is based on model checking with the use of SPIN tool. Implementation of such verification is fulfilled at initial design stages and provides earlier detection of contradictions in the used security policy and inconsistencies between the network topology and requirements of the information system.
Keywords:
information security, information flows, embedded devices.
Received: 09.10.2013
Citation:
V. Desnitsky, “A technique for verification of network information flows in information and telecommunication systems with embedded devices”, Tr. SPIIRAN, 30 (2013), 246–257
Linking options:
https://www.mathnet.ru/eng/trspy685 https://www.mathnet.ru/eng/trspy/v30/p246
|
Statistics & downloads: |
Abstract page: | 134 | Full-text PDF : | 64 | References: | 33 | First page: | 1 |
|