Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gabriele Lenzini is active.

Publication


Featured researches published by Gabriele Lenzini.


International Journal of Information Security | 2007

Audit-based compliance control

Jan Cederquist; Ricardo Corin; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini

In this paper we introduce a new framework for controlling compliance to discretionary access control policies [Cederquist etxa0al. in Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY), 2005; Corin etxa0al. in Proceedings of the IFIP Workshop on Formal Aspects in Security and Trust (FAST), 2004]. The framework consists of a simple policy language, modeling ownership of data and administrative policies. Users can create documents, and authorize others to process the documents. To control compliance to the document policies, we define a formal audit procedure by which users may be audited and asked to justify that an action was in compliance with a policy. In this paper we focus on the implementation of our framework. We present a formal proof system, which was only informally described in earlier work. We derive an important tractability result (a cut-elimination theorem), and we use this result to implement a proof-finder, a key component in this framework. We argue that in a number of settings, such as collaborative work environments, where a small group of users create and manage document in a decentralized way, our framework is a more flexible approach for controlling the compliance to policies.


CTIT technical report series | 2004

A logic for auditing accountability in decentralized systems

Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu

We propose a language that allows agents to distribute data with usage policies in a decentralized architecture. In our framework, the compliance with usage policies is not enforced. However, agents may be audited by an authority at an arbitrary moment in time. We design a logic that allows audited agents to prove their actions, and to prove their authorization to posses particular data. Accountability is defined in several flavors, including agent accountability and data accountability. Finally, we show the soundness of the logic.


dependable systems and networks | 2000

An automatic SPIN validation of a safety critical railway control system

Stefania Gnesi; Gabriele Lenzini; D. Latella; C. Abbaneo; A. Amendola; P. Marmo

This paper describes an experiment informal specification and validation performed in the context of an industrial joint project. The project involved an Italian company working in the field of railway engineering, Ansaldobreda Segnalamento Ferroviario, and the CNR Institutes IEI and CNUCE of Pisa, Within the project two formal models have been developed describing different aspects of a safety-critical system used in the management of medium-large railway networks. Validation of safety and liveness properties has been performed on both models. Safety properties have been checked primarily in presence of Byzantine faults as well as of silent faults embedded in the models themselves. Liveness properties have been more focused on a communication protocol used within the system. Properties have been specified by means of assertions or temporal logical formulae. We used PROMELA as specification language, while the verification was performed using the verification tool suite SPIN.


Electronic Notes in Theoretical Computer Science | 2005

Team Automata for Security

Maurice H. ter Beek; Gabriele Lenzini; Marinella Petrocchi

In Kleijn, J., Team Automata for CSCW -- A Survey --, Petri Net Technology for Communication-Based Systems---Advances in Petri Nets, LNCS 2472, Springer, 2003, 295--320], Kleijn presented a survey of the use of team automata for the specification and analysis of phenomena from the field of computer supported cooperative work, in particular notions related to groupware systems. In this paper we present a survey of the use of team automata for the specification and analysis of some issues from the field of security. In particular, we show how team automata can adequately be used to model and verify various access control policies, multicast/broadcast communication protocols, and general (cryptographic) communication protocols.


formal methods for open object-based distributed systems | 2005

A formal security analysis of an OSA/Parlay authentication interface

Ricardo Corin; Gaetano Di Caprio; Sandro Etalle; Stefania Gnesi; Gabriele Lenzini; Corrado Moiso

We report on an experience in analyzing the security of the Trust and Security Management (TSM) protocol, an authentication procedure within the OSA/Parlay Application Program Interfaces (APIs) of the Open Service Access and Parlay Group. The experience has been conducted jointly by research institutes experienced in security and industry experts in telecommunication networking. OSA/Parlay APIs are designed to enable the creation of telecommunication applications outside the traditional network space and business model. Network operators consider the OSA/Parlay a promising architecture to stimulate the development of web service applications by third party providers, which may not necessarily be experts in telecommunication and security. The TSM protocol is executed by the gateways to OSA/Parlay networks; its role is to authenticate client applications trying to access the interfaces of some object representing an offered network capability. For this reason, potential security flaws in the TSM authentication strategy can cause the unauthorized use of the network, with evident damages to the operator and the quality of services. We report a rigorous formal analysis of the TSM specification, which is originally given in UML. Furthermore, we illustrate our design choices to obtain the formal model, describe the tool-aided verification and finally expose the security flaws discovered.


Sigir Forum | 2003

Spider: a Security Model Checker

Gabriele Lenzini; Stefania Gnesi; Diego Latella


Journal of Automata, Languages and Combinatorics | 2006

A team automaton scenario for the analysis of security properties of communication protocols

Maurice H. ter Beek; Gabriele Lenzini; Marinella Petrocchi


CTIT technical report series | 2004

Team automata for security analysis

Maurice H. ter Beek; Gabriele Lenzini; Marinella Petrocchi


formal aspects in security and trust | 2004

A Logic for Auditing Accountability in Decentralized Systems.

Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu


Lecture Notes in Computer Science | 2005

A formal security analysis of an OSA/parlay authentication interface

Ricardo Corin; Gaetano Di Caprio; Sandro Etalle; Stefania Gnesi; Gabriele Lenzini; Corrado Moiso

Collaboration


Dive into the Gabriele Lenzini's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stefania Gnesi

Istituto di Scienza e Tecnologie dell'Informazione

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Maurice H. ter Beek

Istituto di Scienza e Tecnologie dell'Informazione

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge