Gabriele Lenzini
University of Twente
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gabriele Lenzini.
International Journal of Information Security | 2007
Jan Cederquist; Ricardo Corin; M.A.C. Dekker; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini
In this paper we introduce a new framework for controlling compliance to discretionary access control policies [Cederquist etxa0al. in Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY), 2005; Corin etxa0al. in Proceedings of the IFIP Workshop on Formal Aspects in Security and Trust (FAST), 2004]. The framework consists of a simple policy language, modeling ownership of data and administrative policies. Users can create documents, and authorize others to process the documents. To control compliance to the document policies, we define a formal audit procedure by which users may be audited and asked to justify that an action was in compliance with a policy. In this paper we focus on the implementation of our framework. We present a formal proof system, which was only informally described in earlier work. We derive an important tractability result (a cut-elimination theorem), and we use this result to implement a proof-finder, a key component in this framework. We argue that in a number of settings, such as collaborative work environments, where a small group of users create and manage document in a decentralized way, our framework is a more flexible approach for controlling the compliance to policies.
CTIT technical report series | 2004
Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu
We propose a language that allows agents to distribute data with usage policies in a decentralized architecture. In our framework, the compliance with usage policies is not enforced. However, agents may be audited by an authority at an arbitrary moment in time. We design a logic that allows audited agents to prove their actions, and to prove their authorization to posses particular data. Accountability is defined in several flavors, including agent accountability and data accountability. Finally, we show the soundness of the logic.
dependable systems and networks | 2000
Stefania Gnesi; Gabriele Lenzini; D. Latella; C. Abbaneo; A. Amendola; P. Marmo
This paper describes an experiment informal specification and validation performed in the context of an industrial joint project. The project involved an Italian company working in the field of railway engineering, Ansaldobreda Segnalamento Ferroviario, and the CNR Institutes IEI and CNUCE of Pisa, Within the project two formal models have been developed describing different aspects of a safety-critical system used in the management of medium-large railway networks. Validation of safety and liveness properties has been performed on both models. Safety properties have been checked primarily in presence of Byzantine faults as well as of silent faults embedded in the models themselves. Liveness properties have been more focused on a communication protocol used within the system. Properties have been specified by means of assertions or temporal logical formulae. We used PROMELA as specification language, while the verification was performed using the verification tool suite SPIN.
Electronic Notes in Theoretical Computer Science | 2005
Maurice H. ter Beek; Gabriele Lenzini; Marinella Petrocchi
In Kleijn, J., Team Automata for CSCW -- A Survey --, Petri Net Technology for Communication-Based Systems---Advances in Petri Nets, LNCS 2472, Springer, 2003, 295--320], Kleijn presented a survey of the use of team automata for the specification and analysis of phenomena from the field of computer supported cooperative work, in particular notions related to groupware systems. In this paper we present a survey of the use of team automata for the specification and analysis of some issues from the field of security. In particular, we show how team automata can adequately be used to model and verify various access control policies, multicast/broadcast communication protocols, and general (cryptographic) communication protocols.
formal methods for open object-based distributed systems | 2005
Ricardo Corin; Gaetano Di Caprio; Sandro Etalle; Stefania Gnesi; Gabriele Lenzini; Corrado Moiso
We report on an experience in analyzing the security of the Trust and Security Management (TSM) protocol, an authentication procedure within the OSA/Parlay Application Program Interfaces (APIs) of the Open Service Access and Parlay Group. The experience has been conducted jointly by research institutes experienced in security and industry experts in telecommunication networking. OSA/Parlay APIs are designed to enable the creation of telecommunication applications outside the traditional network space and business model. Network operators consider the OSA/Parlay a promising architecture to stimulate the development of web service applications by third party providers, which may not necessarily be experts in telecommunication and security. The TSM protocol is executed by the gateways to OSA/Parlay networks; its role is to authenticate client applications trying to access the interfaces of some object representing an offered network capability. For this reason, potential security flaws in the TSM authentication strategy can cause the unauthorized use of the network, with evident damages to the operator and the quality of services. We report a rigorous formal analysis of the TSM specification, which is originally given in UML. Furthermore, we illustrate our design choices to obtain the formal model, describe the tool-aided verification and finally expose the security flaws discovered.
Sigir Forum | 2003
Gabriele Lenzini; Stefania Gnesi; Diego Latella
Journal of Automata, Languages and Combinatorics | 2006
Maurice H. ter Beek; Gabriele Lenzini; Marinella Petrocchi
CTIT technical report series | 2004
Maurice H. ter Beek; Gabriele Lenzini; Marinella Petrocchi
formal aspects in security and trust | 2004
Ricardo Corin; Sandro Etalle; J.I. den Hartog; Gabriele Lenzini; I. Staicu
Lecture Notes in Computer Science | 2005
Ricardo Corin; Gaetano Di Caprio; Sandro Etalle; Stefania Gnesi; Gabriele Lenzini; Corrado Moiso