Armando Pesenti Gritti’s research while affiliated with Middlesex University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


The bound for post text confidentiality
The bound for friendship status confidentiality
Graph of unwinding relations
Refined graph
The unwinding relations for post-text confidentiality
CoSMed: A Confidentiality-Verified Social Media Platform
  • Article
  • Publisher preview available

June 2018

·

36 Reads

·

18 Citations

Journal of Automated Reasoning

Thomas Bauereiß

·

Armando Pesenti Gritti

·

·

Franco Raimondi

This paper describes progress with our agenda of formal verification of information flow security for realistic systems. We present CoSMed, a social media platform with verified document confidentiality. The system’s kernel is implemented and verified in the proof assistant Isabelle/HOL. For verification, we employ the framework of Bounded-Deducibility (BD) Security, previously introduced for the conference system CoCon. CoSMed is a second major case study in this framework. For CoSMed, the static topology of declassification bounds and triggers that characterized previous instances of BD Security has to give way to a dynamic integration of the triggers as part of the bounds. We also show that, from a theoretical viewpoint, the removal of triggers from the notion of BD Security does not restrict its expressiveness.

View access options

CoSMed: A Confidentiality-Verified Social Media Platform

February 2018

·

6 Reads

·

2 Citations

This paper describes progress with our agenda of formal verification of information flow security for realistic systems. We present CoSMed, a social media platform with verified document confidentiality. The system’s kernel is implemented and verified in the proof assistant Isabelle/HOL. For verification, we employ the framework of Bounded-Deducibility (BD) Security, previously introduced for the conference system CoCon. CoSMed is a second major case study in this framework. For CoSMed, the static topology of declassification bounds and triggers that characterized previous instances of BD Security has to give way to a dynamic integration of the triggers as part of the bounds. We also show that, from a theoretical viewpoint, the removal of triggers from the notion of BD Security does not restrict its expressiveness.


CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees

May 2017

·

42 Reads

·

21 Citations

We present the design, implementation and information flow verification of CoSMeDis, a distributed social media platform. The system consists of an arbitrary number of communicating nodes, deployable at different locations over the Internet. Its registered users can post content and establish intra-node and inter-node friendships, used to regulate access control over the posts. The system's kernel has been verified in the proof assistant Isabelle/HOL and automatically extracted as Scala code. We formalized a framework for composing a class of information flow security guarantees in a distributed system, applicable to input/output automata. We instantiated this framework to confidentiality properties for CoSMeDis's sources of information: posts, friendship requests, and friendship status.



CoSMed: A Confidentiality-Verified Social Media Platform

August 2016

·

111 Reads

·

16 Citations

Lecture Notes in Computer Science

This paper describes progress with our agenda of formal verification of information-flow security for realistic systems. We present CoSMed, a social media platform with verified document confidentiality. The system’s kernel is implemented and verified in the proof assistant Isabelle/HOL. For verification, we employ the framework of Bounded-Deducibility (BD) Security, previously introduced for the conference system CoCon. CoSMed is a second major case study in this framework. For CoSMed, the static topology of declassification bounds and triggers that characterized previous instances of BD security has to give way to a dynamic integration of the triggers as part of the bounds.

Citations (5)


... Three major verification case studies will also be briefly described while recalling their contribution to the framework's design (Section 3). These are the CoCon conference management system (Section 3.1, [23,37]), the CoSMed social media platform (Section 3.2, [7,9]), and the CoSMeDis distributed extension of CoSMed (Section 3.3, [8]). ...

Reference:

Bounded-deducibility security
CoSMed: A Confidentiality-Verified Social Media Platform
  • Citing Article
  • February 2018

... Prior work on practical secure declassification includes the verification of the kernel of a conference management system [66], a social media platform [12] and its distributed successor [11]. These works proved variants of the generic security property of Bounded Deducibility [65], which is similar to declassification policies D. The proofs use manual unwinding in Isabelle/HOL, over an abstract program representation of I/O automata. ...

CoSMed: A Confidentiality-Verified Social Media Platform

Journal of Automated Reasoning

... Prior work on practical secure declassification includes the verification of the kernel of a conference management system [66], a social media platform [12] and its distributed successor [11]. These works proved variants of the generic security property of Bounded Deducibility [65], which is similar to declassification policies D. The proofs use manual unwinding in Isabelle/HOL, over an abstract program representation of I/O automata. ...

CoSMeDis: A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees

... OpenCV is an open-source and cross-platform computer vision library that contains many algorithms that are used in digital image processing and provides a large number of Java interfaces [40]. Thus, this study uses the OpenCV function library to extract and classify the image features. ...

On-the-Fly Image Classification to Help Blind People

... • An delegation/revocation policy [3], [32], [50], [38] updates dynamically the sensitivity roles in a security system to accommodate the mutable requirements of security, such as delegating/revoking the access rights of a new/leaving employee. Moreover, there are a few case studies on the needed security properties in the light of one specific context or task [6], [31], [43], [49], and build systems that provably enforces some variants of declassification policy (e.g., CoCon [34], CosMeDis [12]) and erasure policy (e.g., Civitas [21]). ...

CoSMed: A Confidentiality-Verified Social Media Platform

Lecture Notes in Computer Science