are the computer systems based on state machine presentation: the operating systems,
DBMSs, and firewalls.
At last decades, a number of individual countries developed their own security
evaluation standards (e.g. [11]). In addition to, opening the way to world-wide mutual
recognition of security evaluation results, the new Common Criteria (CC) [12] have
been developed. For example, CC define 7 levels (EAL1…7) of assurance for
security systems. To get a higher assurance, over EAL5, developers require to specify
security model and verify its safety property using formal methods approach. Vendors
are discouraged from offering secure systems because significant time and efforts are
needed to develop a system capable for meeting the evaluation criteria and to marshal
it through the evaluation process. Moreover, because of evaluation delays, an
evaluated product is typically no longer the current version of the system, which
necessitates repeated reevaluation. For high assurance systems, the difficulties of
using formal methods add further complexity to both development and evaluation.
However, given the lack of suitable mature, "industrial-strength tools" and the cost of
a formal verification activity, informal approach represents a suitable compromise.
The SEW is very useful for administrators and security officers to monitor the
system securable resources (files, printers, accounts, processes, etc). The SEW allows
any user to discover security of her system in-the-depth, and thus open the 'holes' in
the protection. The OSCVs, as mentioned, represent a very serious problem in the
modern operating systems. Contemporary systems operate with a huge number of
security settings, and the user needs some tools that could explain the whys and
wherefores of security weaknesses. The SEW utility makes this process closer to
person than ever, because while logical resolving it marks the clause that caused fault
of OSCV-criterion, and supplies user with a true reason of the security flaw.
The current versions of the mentioned facility are aimed at such well-known
systems as Microsoft Windows 2000/XP and Linux-style systems. For the future
works, we will develop and elaborate the SEW components such as the State
Analyzer, Criteria Manager, and Security State Explorer to support easy modeling and
analyses for safety problem in Microsoft Windows Server solutions (i.e. Active
Directory and Group Policy support). Besides, we are targeted at the remote security
analysis. To achieve this we develop the Remote Agent module of the SEW which
starts the State Analyzer remotely and transmits the scope through the networks.
References
1. J. McLean. Security Model, In Encyclopedia of Software Engineering, Wiley Press, 1994.
2. J. Goguen and J. Meseguer. Security Policies and security models, In Proceedings of the
1982 IEEE Symp. on Research in Security and Privacy, IEEE Computer Security Press.
3. L.J. LaPadula and D.E. Bell. Secure computer systems: A mathematical model, ESD-TR-
278, VOL.2, The Mitre Corp., Bedford, MA, 1973.
4. M.H. Harrison, W.L. R.uzzo, and J.D. Ullman. Protection in operating systems,
Communications of the ACM, 19(8):461-471, 1976.
5. M. Bishop and L. Snyder. The transfer of information and authority in a protection system,
In Proceedings of the 7th ACM Symp. on Operating System Principles, pp. 45-54, 1979.
275