In this PhD thesis, new echniques based on Formal Methods are presented for security verification of systems. The mosti mportant ideas of this thesis use Process Mining as a bridge to connect Formal Methods with security verification of Business Processes. In particular, the thesis analyzes and proposes two new approaches. The first approach is proposed for Online Compliance Checking of inter-organizational high-throughput business processes, and it is based on a “silent” centralized system composed of a Validation Authority and special Software Agents installed in each involved entity, which send special observations to the Verification Authority and at the same time they take into account important privacy constraints which may be expressed by the involved organizations. The purpose is to create a merged event trace which can be analyzed for security verification using formal specification language, and a new important specification language is also presented. ThesecondapproachusesAbstractiontechniquesbasedonover-approximationandunderapproximation for Conformance Checking of incomplete log records in order to find security anomalies in terms of causal dependencies expressed in a specification. Moreover, Abstraction techniques has also been defined for Software Model Checking, still based on a combination of over-approximation and under-approximation techniques.

Process mining and abstraction: formal methods for securing software and transactions

CALLIA D'IDDIO, ANDREA
2014

Abstract

In this PhD thesis, new echniques based on Formal Methods are presented for security verification of systems. The mosti mportant ideas of this thesis use Process Mining as a bridge to connect Formal Methods with security verification of Business Processes. In particular, the thesis analyzes and proposes two new approaches. The first approach is proposed for Online Compliance Checking of inter-organizational high-throughput business processes, and it is based on a “silent” centralized system composed of a Validation Authority and special Software Agents installed in each involved entity, which send special observations to the Verification Authority and at the same time they take into account important privacy constraints which may be expressed by the involved organizations. The purpose is to create a merged event trace which can be analyzed for security verification using formal specification language, and a new important specification language is also presented. ThesecondapproachusesAbstractiontechniquesbasedonover-approximationandunderapproximation for Conformance Checking of incomplete log records in order to find security anomalies in terms of causal dependencies expressed in a specification. Moreover, Abstraction techniques has also been defined for Software Model Checking, still based on a combination of over-approximation and under-approximation techniques.
2014
Inglese
TALAMO, MAURIZIO
Università degli Studi di Roma "Tor Vergata"
File in questo prodotto:
File Dimensione Formato  
FINALEINVIO.pdf

non disponibili

Dimensione 4.89 MB
Formato Adobe PDF
4.89 MB Adobe PDF

I documenti in UNITESI sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14242/195661
Il codice NBN di questa tesi è URN:NBN:IT:UNIROMA2-195661