skip to main content
research-article
Open Access

The certification of the Mondex electronic purse to ITSEC Level E6

Authors Info & Claims
Published:01 January 2008Publication History
Skip Abstract Section

Abstract

Abstract.

Ten years ago the Mondex electronic purse was certified to ITSEC Level E6, the highest level of assurance for secure systems. This involved building formal models in the Z notation, linking them with refinement, and proving that they correctly implement the required security properties. The work has been revived recently as a pilot project for the international Grand Challenge in Verified Software. This paper records the history of the original project and gives an overview of the formal models and proofs used.

References

  1. BJP+06a Banach R, Jeske C, Poppleton M, Stepney S (2006) Retrenching the purse: finite exception logs, and validating the small. 30th Annual IEEE/NASA Software engineering workshop. Columbia, April 2006Google ScholarGoogle Scholar
  2. BJP+06b Banach R, Jeske C, Poppleton M, Stepney S (2006) Retrenching the purse: hashing injective CLEAR codes, and security properties. In: 2nd International symposium on leveraging applications of formal methods, verification and validation (ISoLA 2006). Cyprus, November 2006. IEEE, 2006Google ScholarGoogle Scholar
  3. BJP+07 Banach RJeske CPoppleton MStepney SRetrenching the purse: the balance enquiry quandary, and generalised and (1,1) forward refinementsFundam Inform2007771412329273Google ScholarGoogle Scholar
  4. BP98 Banach RPoppleton MRetrenchment: an engineering variation on refinement B-98. Lecture notes in computer science, vol 1393.1998HeidelbergSpringerGoogle ScholarGoogle Scholar
  5. BPJ+05a Banach R, Poppleton M, Jeske C, Stepney S (2005) Retrenchment and the Mondex electronic purse (extended abstract). In: Proceedings 12th international workshop on abstract state machines (ASM’05). Paris, March 2005Google ScholarGoogle Scholar
  6. BPJ+05b Banach R, Poppleton M, Jeske C, Stepney S (2005) Retrenching the purse: finite sequence numbers and the tower pattern. In: Proceedings FM05. Lecture notes in computer science, vol 3582. Springer, Heidelberg, pp 382–398Google ScholarGoogle Scholar
  7. BSC94 Barden RStepney SCooper DZ in Practice BCS Practitioners Series1994Englewood CliffsPrentice HallGoogle ScholarGoogle Scholar
  8. BoD05 Boiten EADerrick JFormal program development with approximations ZB 2005 Lecture notes in computer science vol 34552005HeidelbergSpringer374392Google ScholarGoogle Scholar
  9. Bur02 Burton S (2002) Automated testing of high integrity test suites from graphical specifications. Ph.D. thesis. Department of Computer science, University of YorkGoogle ScholarGoogle Scholar
  10. CSC05 Clark JAStepney SChivers HBreaking the model: finalisation and a taxonomy of security attacks. REFINE 2005, SurreyElectron Notes Theor Comput Sci2005137222524210.1016/j.entcs.2005.04.033Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. CSW02 Cooper D, Stepney S, Woodcock J (2002) derivation of Z refinement proof rules: forwards and backwards rules incorporating input/output refinement. Technical report YCS-2002-347, December, University of YorkGoogle ScholarGoogle Scholar
  12. CoCURL http://www.niap-ccevs.org/cc-scheme/cc_docs/Google ScholarGoogle Scholar
  13. DeB01 Derrick JBoiten ERefinement in Z and Object-Z2001HeidelbergSpringer0982.68086Google ScholarGoogle ScholarCross RefCross Ref
  14. Dun03 Dunne S (2003) Introducing backwards refinement into B. In: ZB2003: third international conference of B and Z Users, Turku, June 2003. Lecture notes in computer science, vol 2651, Springer, Heidlberg, pp 178–196Google ScholarGoogle Scholar
  15. FHD90 Flynn M, Hoverd T, Brazier D (1990) Formaliser—an interactive support tool for Z. Z UserWorkshop. In: Proceedings of the 4th annual Z user meeting, workshops in computing, Springer, Hiedelberg, pp 128–141Google ScholarGoogle Scholar
  16. GCH97 E6: Use of formality discussion. G3A Tape No 68. Unclassified. Government Communications Headquarters (GCHQ). 22 October 1997Google ScholarGoogle Scholar
  17. HHH+87 Hoare CAR, Hayes IJ, He J, Morgan C, Roscoe AW, Sanders JW et al (1987) The laws of programming. Commun ACM. 30Google ScholarGoogle Scholar
  18. HHS86 Jifeng HHoare CARSanders JWData refinement refined: resume. ESOP 86. Lecture notes in computer science, vol 2131986HeidelbergSpringer187196Google ScholarGoogle Scholar
  19. ITS91 Information Technology Security Evaluation Criteria (ITSEC): Preliminary Harmonised Criteria. Document COM(90) 314, Version 1.2. Commission of the European Communities. June 1991Google ScholarGoogle Scholar
  20. Jac92 Jacob JLBasic theorems about securityJ Comput Secur199214385411Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. SCP+03 Srivratanakul J, Clark J, Polack F, Stepney S (2003) Challenging formal specifications with mutation: a CSP security example. 12th IEEE Asia Pacific Software Engineering Conference (APSEC)Google ScholarGoogle Scholar
  22. SCW00 Stepney S, Cooper D, Woodcock J (2000) An electronic purse: specification, refinement, and proof. Technical monograph PRG-126, Oxford University Computing Laboratory, July 2000Google ScholarGoogle Scholar
  23. SCW98 Stepney S, Cooper D, Woodcock J (1998) More powerful Z data refinement: pushing the state of the art in industrial refinement. In: ZUM ’98: 11th international conference of Z users, Berlin, September 1998. Lecture notes in computer science, vol 1493. Springer, Heidelberg, pp 284–307Google ScholarGoogle Scholar
  24. SFT03 Stepney S, Polack F, Toyn I (2003) Patterns to guide practical refactoring: examples targetting promotion in Z. In: ZB2003: third international conference of B and Z Users, Turku, June 2003. Lecture notes in computer science, vol 2651. Springer, Heidelberg, pp 20–39Google ScholarGoogle Scholar
  25. Spi92a Spivey JM (1992) The Z Notation: a reference manual, 2nd edn. http://spivey.oriel.ox.ac.uk/~mike/fuzzGoogle ScholarGoogle Scholar
  26. Spi92b Spivey JMThe fUZZ Manual. Computer Science Consultancy19922Englewood CliffPrentice HallGoogle ScholarGoogle Scholar
  27. Ste01 Stepney S (2001) New horizons in formal methods. The Computer Bulletin, pp 24–26. BCS, January 2001Google ScholarGoogle Scholar
  28. Ste98 Stepney S (1998) A tale of two proofs. BCS-FACS third Northern formal methods workshop, Ilkley, September 1998. Electronic Workshops in ComputingGoogle ScholarGoogle Scholar
  29. WoD96 Woodcock JDavies JUsing Z: specification, refinement, and proof1996Englewood CliffPrentice Hall0855.68060Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The certification of the Mondex electronic purse to ITSEC Level E6
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader