The University of Southampton
University of Southampton Institutional Repository

Formal Modelling and Verification of Trust in a Pervasive Application

Formal Modelling and Verification of Trust in a Pervasive Application
Formal Modelling and Verification of Trust in a Pervasive Application
This report is deliverable WP4-01 of the project “Trusted Software Agents and Services for Pervasive Information Environments.” The deliverable reports on the activities of formal modelling and verification of a pervasive application which follows from previous results in the project. The pervasive application is based on several pervasive scenarios already devised and is centred on the user location. This location-based system is first architecturally simplified, while trust requirements are derived from the Trust Analysis Framework presented in the deliverable WP2-01. This first abstraction is then completed by formal modelling of the system in the B formal method. These models enable us to clarify the decision decisions leading to fulfil the trust requirements. We show that the system policy structure is influenced by the priorities given to the system operations and that a sufficiently high level of abstraction is required to model trust properties. The modelling activity is completed by formal verification using the ProB model-checker to automate part of this process. Several models are checked successfully, while detection of errors in other models enables us to understand better the behaviour of the system. In particular, issues relative to the dynamicity of modelled elements are highlighted. The overall methodology followed during these activities proved useful at helping us specifying accurately the trust requirements, so that the pervasive application can be completed in consequence, and is as follows: 1) Model important features of the system First vaguely type the variables; then write a set of operations corresponding to complementary features while (possibly) modifying the variable types to ease this writing; consider the variables by group of similar dynamic properties; 2a) Model-check the model 2a.a) Property violation detected Examine the various aspects of the model (variables, enabled operations, history of operations) to see what part of the property is “false”; Correct the model accordingly; 2a.b) No property violation detected Go back to 2a until coverage rate is enough; possible changes to the model include: modify the initialisation to test other situations (in B use “choice by predicate”); add inconsistencies in the model; 2b) Animate the model 2b.a) Execute the desired sequence of operations (validation); 2b.b) Find an interesting state, then 2a.a or 2a.b applies; 2b.c) Backtrack from a state where the invariant is violated; 3) Go back to 1 (complete the model) or refine the model.
Lo Presti, Stephane
69286343-e012-4a66-bde9-82667af4a6f4
Butler, Michael
54b9c2c7-2574-438e-9a36-6842a3d53ed0
Leuschel, Michael
c2c18572-66cf-4f84-ade4-218ce3afe78b
Snook, Colin
b2055316-9f7a-4b31-8aa1-be0710046af2
Turner, Phillip
fc602874-84e8-4e44-a5b1-fbd5fba36be3
Lo Presti, Stephane
69286343-e012-4a66-bde9-82667af4a6f4
Butler, Michael
54b9c2c7-2574-438e-9a36-6842a3d53ed0
Leuschel, Michael
c2c18572-66cf-4f84-ade4-218ce3afe78b
Snook, Colin
b2055316-9f7a-4b31-8aa1-be0710046af2
Turner, Phillip
fc602874-84e8-4e44-a5b1-fbd5fba36be3

Lo Presti, Stephane, Butler, Michael, Leuschel, Michael, Snook, Colin and Turner, Phillip (2004) Formal Modelling and Verification of Trust in a Pervasive Application

Record type: Monograph (Project Report)

Abstract

This report is deliverable WP4-01 of the project “Trusted Software Agents and Services for Pervasive Information Environments.” The deliverable reports on the activities of formal modelling and verification of a pervasive application which follows from previous results in the project. The pervasive application is based on several pervasive scenarios already devised and is centred on the user location. This location-based system is first architecturally simplified, while trust requirements are derived from the Trust Analysis Framework presented in the deliverable WP2-01. This first abstraction is then completed by formal modelling of the system in the B formal method. These models enable us to clarify the decision decisions leading to fulfil the trust requirements. We show that the system policy structure is influenced by the priorities given to the system operations and that a sufficiently high level of abstraction is required to model trust properties. The modelling activity is completed by formal verification using the ProB model-checker to automate part of this process. Several models are checked successfully, while detection of errors in other models enables us to understand better the behaviour of the system. In particular, issues relative to the dynamicity of modelled elements are highlighted. The overall methodology followed during these activities proved useful at helping us specifying accurately the trust requirements, so that the pervasive application can be completed in consequence, and is as follows: 1) Model important features of the system First vaguely type the variables; then write a set of operations corresponding to complementary features while (possibly) modifying the variable types to ease this writing; consider the variables by group of similar dynamic properties; 2a) Model-check the model 2a.a) Property violation detected Examine the various aspects of the model (variables, enabled operations, history of operations) to see what part of the property is “false”; Correct the model accordingly; 2a.b) No property violation detected Go back to 2a until coverage rate is enough; possible changes to the model include: modify the initialisation to test other situations (in B use “choice by predicate”); add inconsistencies in the model; 2b) Animate the model 2b.a) Execute the desired sequence of operations (validation); 2b.b) Find an interesting state, then 2a.a or 2a.b applies; 2b.c) Backtrack from a state where the invariant is violated; 3) Go back to 1 (complete the model) or refine the model.

Text
TSAS_-_WP4-01_v1.pdf - Other
Download (2MB)

More information

Published date: June 2004
Organisations: Electronic & Software Systems

Identifiers

Local EPrints ID: 260183
URI: http://eprints.soton.ac.uk/id/eprint/260183
PURE UUID: 15c3dfa8-3974-40d2-ab68-ee0de6d60b70
ORCID for Michael Butler: ORCID iD orcid.org/0000-0003-4642-5373
ORCID for Colin Snook: ORCID iD orcid.org/0000-0002-0210-0983

Catalogue record

Date deposited: 10 Dec 2004
Last modified: 15 Mar 2024 03:12

Export record

Contributors

Author: Stephane Lo Presti
Author: Michael Butler ORCID iD
Author: Michael Leuschel
Author: Colin Snook ORCID iD
Author: Phillip Turner

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×