![]() |
![]() Malicious-and Accidental-Fault Tolerance for Internet Applications IST Research Project IST- 1 January 2000 - 28 February 2003 |
|
|
|||||
[ Conceptual Model ] [ Architecture ] [ Mechanisms and Protocols ] [ Verification and Assessment ] Verification and AssessmentThe verification and assessment work within MAFTIA was largely performed by Saarland and QinetiQ, but involved close collaboration with other partners whose protocols and mechanisms were being verified, notably IBM and Lisbon. The goals of the verification and assessment work were three-fold:
|
||||||
Figure 5 : An application of the composition theorem The system has been split into two layers. The lower layer is a cryptographic system whose security can be rigorously proven using standard cryptographic arguments. To the upper layer it provides an abstract (and typically deterministic) service that hides all cryptographic details. Relative to this abstract service one can verify the upper layer using existing formal methods. Since the models allow secure composition, one can conclude that the overall system is secure if the formally verified upper layer is put on top of a cryptographically verified lower layer. In addition to exploring the relationship between the two different approaches to verification and assessment of secure systems, both cryptographic and process algebraic techniques were used to formalise and verify selected components of the MAFTIA middleware. The modelling of the TTCB services provided a good case study for how to model services running over hybrid networks. During the verification of these TTCB protocols, a productive dialogue ensued between the protocol author and verifier to resolve ambiguities, and the verifier was able to suggest minor amendments to one of the services provided by the TTCB that would result in a more fault tolerant service. [ Conceptual Model ] [ Architecture ] [ Mechanisms and Protocols ] [ Verification and Assessment ] |
|