91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

CSC8204 代寫、Secure Software程序

時間:2023-12-10  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Secure Software Development
Coursework 2023
Aims:
The aim of this assignment is to increase and assess understanding and resolution of risk analysis, SecureUML design, formal modelling and verification.
The coursework consists of 4 equally weighted questions.
Submission details:
Submission deadline: 15 Dec 2023, 15:30
Submit your solution to Ness by the deadline. Your solution should consist of a single .docx or .pdf document with answers to each of the questions below.
Assessment:
The coursework is marked out of 100, with 25 marks for each question . Support:
You will find the formative exercises in Dafny and SecureUML useful for answering the questions in this coursework. After completing these exercises, you can use the remaining practical classes to ask questions.
Questions can also be posted in the Canvas discussion board.
Scenario:
This coursework is derived from the Tokeneer ID Station, a research project undertaken in 2008 by Altran Praxis (formerly Praxis Critical Systems). The project was to demonstrate the development of secure systems in a rigorous manner, and the final report1 provides an overview of the project documentation, including requirements analysis, formal specification (in Z), SPARK Ada implementation and verification, and top-down system testing.
Tokeneer is described as a “biometrics prototype”. The Tokeneer ID Station or TIS, one part of the Tokeneer System, protects access to secure information held on a network of workstations, held in a physically secure space or “enclave”.
1 Available from AdaCore at http://www.adacore.com/uploads/downloads/Tokeneer_Report.pdf
  
 Figure 1 Tokeneer system overview
The Tokeneer system displayed in Figure 1 consists of the secure enclave plus other components that are physically either inside or outside the enclave:
• Enrolment Station issues a token to a user. The token contains up to four signed certificates: an ID Certificate generated by a Certificate Authority; a Privilege Certificate and a biometric Identification and Authentication (I&A) Certificate, both generated by an Attribute Authority; and an Authorisation Certificate which is generated by the TIS, as described below.
• Tokeneer ID Station (TIS) uses the biometric information in the I&A certificate, and scan of the user’s fingerprint, to verify the user. On successful identification, if the Privilege Certificate confirms the user has sufficient clearance, the TIS adds a signed Authorisation Certificate to the user’s token and releases the enclave door lock, allowing entrance to the secure space.
• Inside the secure space (enclave) are a number of Workstations. A workstation checks the Authorisation Certificate to confirm the user is currently authorised to use the workstation facilities.

Part A Applied Risk Analysis [25 Marks]
According to McGraw’s software security approach, the secure software development is founded on a comprehensive applied risk analysis taking into account business goals, business risks, and technical risks.
Aim:
Develop an applied risk analysis based on the documentation of the Tokeneer project (http://www.adacore.com/uploads/downloads/Tokeneer_Report.pdf).
Approach:
Develop the risk analysis based on McGraw’s methodology introduced in the recommended literature McGraw – Software Security and in the lecture on Principles of Software Security.
Evaluate:
1. Business goals of Praxis High Integrity Systems in undertaking the Tokeneer project. Rank the business goals according to the NIST business goal classification.
2. Three main business risks affecting Praxis High Integrity Systems, including: • Business risk indicator
• NIST business risk likelihood scaling
• NIST business risk impact scaling
• Overall NIST severity ranking.
• A one-sentence rationale, why you have chosen this risk over others.
3. Five main technical risks determinable from the Tokeneer report and software
deliverable.
• Analyze the software artifacts
• Evaluate the software security touchpoints
• Use the 10 best practice security principles by McGraw.
• Specify the risk likelihood and possible impact vis-à-vis of available controls.
• Write a one-sentence rationale, why you have chosen this risk over others.
4. Conduct a risk synthesis connecting business goals, business risks and technical risks.
5. Derive one mitigation approach for each technical risk. Justify your choice.
Deliverable:
To complete this part of the coursework, complete an applied risk management report that enumerates the risk register in the tabular form introduced by McGraw and in the lecture on Principles of Software Security. Examples for such tables are given in the lecture slides, slides 2**9.
In addition to the risk register, document the rationale for the risks and the chosen mitigation methods in a brief summary, no more than one side A4.
Ultimately, the coherence and consistency of your argument for your choices will be key in achieving high marks. The risks and mitigation methods must fit the indicated Tokeneer scenario.
Indicative marking guidance: business goals and risks [5 Marks], technical risks [10 Marks], risk synthesis and mitigation [5 Marks], rationale [5 Marks].
    
Part B SecureUML Design [25 Marks]
Model-driven security (MDS) embeds security controls into generated source code and enables formal verification. We investigate SecureUML as a an MDS approach that enables enforcement of confidentiality and integrity through Role-Based Access Control (RBAC).
Aim:
Develop a high-level UML model in the style of SecureUML which models a suitable security policy for the Tokeneer ID station.
 Figure 2 SecureUML Metamodel
Approach:
Create an UML Class model that takes the SecureUML metamodel shown in Figure 2 as foundation and models as a mock-up the defined security policy. Do this in IntelliJ IDEA Diagrams or another appropriate UML modelling software (e.g., Papyrus or Eclipse Modelling).
Design:
Design an UML diagram in the fashion of SecureUML to model the following authentication system: The system manages the certificate handling of the Tokeneer ID station, including (i) how superusers can grant and revoke certificates, (ii) how certificates are derived from one another, and (iii) how an enclave user can log in to and be logged out from workstations.
Create a UML design to capture the following security policy: Subjects = { Alice, Bob, Administrator }; Roles = { EnclaveUser, Superuser }; Actions = { Grant, Revoke, Open, Login, Logout }; Resources = { Workstation, TIS, IDCertificate, IACertificate, PrivilegeCertificate, AuthorizationCertificate } Any user can login to a workstation if the user has an AuthorizationCertificate. Certificates are derived/enforced by the TIS based on the rules highlighted above. A superuser can grant/revoke any certificate and logout any user.
Deliverable:
A UML model that establishes an appropriate RBAC policy according to the SecureUML methodology. It is sufficient to submit a UML class diagrams (incl. dialect design), but not required to design an UML profile. Submit a report displaying your class diagrams along with a rationale for your design, no more than one side A4.
Indicative marking guideline: System, RBAC and dialect UML design [18 Marks]; Rationale [7 Marks]. It is sufficient to capture SecureUML elements conceptually.

Part C Formal Modelling [25 marks]
The Dafny file tokeneer.dfy2 has the beginning of an abstract formal model of part of the tokeneer system in Dafny. The model is not intended to be executable. Your task is to extend the model by answering the questions below.
Aim:
Develop an extended model of the tokeneer certificates and tokens. You do not need to provide
data to test your model. The aim of the exercise is to expand and refine the model specification.
Approach:
Follow the guidelines given in the questions below to extend the model.
The model consists of some abstract datatype definitions, some functions, predicates and methods, and some traits and classes. A trait in dafny is similar to an abstract class or interface in java: dafny requires that a class can only extend a trait, it cannot extend another class. This means that we use traits to define superclasses. See for example the trait Certificate which is extended by the class IDCert.
The key difference between a trait and a class is that a trait does not have a constructor defined. A class must have a constructor: however, as can be seen in the model, the constructor can be unspecified in an abstract model.
Deliverable:
A revised Dafny model for the tokens and certificates part of the tokeneer system. Include the full content of your Dafny file (as text, not as a screenshot image) in your report. You can format it as follows (by copying and pasting the content of your .dfy file into your word document):
/*
Solution to CSC8204 Coursework Part C
*/
 // basic types
type optional<T> = ts: set<T> | |ts| <= 1 type TIME = nat
 Questions:
1) Clearance class. Find the definition of Clearance, which has a single field (cClass) represented by the enumerated type CLEARANCE_CLASS. A newly created Clearance object will initially have the value unmarked.
a) Add a postcondition (ensures) to the constructor to record this. [2 marks] 2 The model is available as tokeneer.dfy in the repository https://github.com/SteveR-Ncl/CSC8204-Dafny
  
A ghost function minClearance has been specified. It should return the minimum of two Clearance objects, ie Clearance(a,b) will return a if the object a has a lower clearance than b. “Lower” is implied by the ordering of the enumeration, ie unmarked < unclassified < restricted etc.
b) Complete the definition of ghost function minClearance to return the minimum clearance object as described above. Use c1.cClass to access the value of the cClass field in the object c1. Hint: you will need to use a reads clause as described in the lecture.
[4 marks]
2) Admin Privilege. A user can have one of 4 privileges, as shown by the enumerated datatype definition PRIVILEGE. Only the admin roles (guard, auditManager, securityOfficer) have any admin operations available to them, as follows:
• A guard can use the overrideLock operation
• An auditManager can use the archiveLog operation
• A securityOfficer can use the updateData and shutdownOp operations
a) Modify your model to add a new enumerated datatype called ADMINOP, with values representing the four operations above (overrideLock, etc) [2 marks]
b) Add a function with signature as follows:
function availableOps(p: PRIVILEGE): set<ADMINOP>
Provide a function body which returns the set of operations available to a user with privilege level p. [8 marks]
3) Token Predicates. A token class is defined in the model. It has fields for the tokenID and up to 4 certificates held on the token (ID Certificate, Privilege Certificate, I and A Certificate, and (optionally) Authorisation Certificate. Each certificate has its own ID; the Privilege, I and A and Authorisation Certificates also contain the ID of the token and the ID of the ID certificate. There are 3 predicate functions to define in the token class: ValidToken(), TokenWithValidAuth(), CurrentToken(TIME).
Complete the predicate functions using the following definitions:
• A Valid Token has Privilege and I and A certificates correctly cross-referencing the ID Certificate and TokenID. It need not have a valid Authorisation certificate.
• A Token with a Valid Authorisation must have an Authorisation certificate, and must have correct cross-reference to the token ID and ID certificate’s ID
• A Current Token is defined using input parameter now, representing the current time. A current token is a Valid Token where all the certificates are current, ie the current time is included in the validityPeriods for each of the id certificate, privilege certificate and I and A certificates.
Hint: set notation may be helpful here. Use a in B to express that a is a member of set B, and B * C to indicate intersection of sets B and C. [9 marks]

Part D [25 marks]
This question makes use of the Floyd-Hoare logic to analyse code samples and investigate whether they can be formally verified, using the approach described in the lectures on Program Verification.
Aim:
The question assesses skill and understanding in formal verification, weakest precondition semantics and Floyd-Hoare logic.
Deliverable:
Provide your answers to all the questions in Part D of you submission document.
Questions
For each of the two code samples shown, use the weakest precondition approach to derive any necessary precondition in order to prove that the code is partially correct with respect to the specification. Sample 2 uses information derived from the tokeneer scenario.
Be sure to show each step in the derivation and indicate which proof rules have been used.
1) Sums method [10 marks]
 method Sums(x: int, y: int) returns (m: int, n: int) ensures m > n
{
    var a: int;
    m := x;
    n := y;
    a := 2 * m + n;
    n := n - 1;
m := a; }
2) UpdateAlarms method [15 marks]
datatype ALARM = silent | alarming
method UpdateAlarms(doorAlarm: ALARM, auditAlarm: ALARM) returns (alarm: ALARM) ensures (alarm == alarming) <==>
 (doorAlarm == alarming) || (auditAlarm == alarming)
 {
if doorAlarm == alarming || auditAlarm == alarming
{ alarm := alarming; }
else
{ alarm := silent ;} }
 請加QQ:99515681 或郵箱:99515681@qq.com   WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:CON3602 代做、代寫 java 語言編程
  • 下一篇:代做ECM2418、代寫 java,Python 程序設計
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    2025年10月份更新拼多多改銷助手小象助手多多出評軟件
    2025年10月份更新拼多多改銷助手小象助手多
    有限元分析 CAE仿真分析服務-企業/產品研發/客戶要求/設計優化
    有限元分析 CAE仿真分析服務-企業/產品研發
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
  • 短信驗證碼 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    91精品国产91久久久久久_国产精品二区一区二区aⅴ污介绍_一本久久a久久精品vr综合_亚洲视频一区二区三区
    国产精品一区三区| 日韩av电影一区| 国产精品毛片在线| 国模冰冰炮一区二区| 国产精品你懂的在线欣赏| 久久久一本精品99久久精品66| 国产制服丝袜一区| 国产自产高清不卡| 欧美日韩影院| 欧美一区二区三区久久精品| 成人免费观看视频| 丝袜美腿一区二区三区| 欧美日韩一卡二卡三卡 | 日韩女同互慰一区二区| 国内揄拍国内精品久久| 日本中文字幕一区二区视频 | 精品欧美一区二区三区精品久久| 亚洲黄色影片| 国产精品77777竹菊影视小说| 日产欧产美韩系列久久99| 亚洲美女屁股眼交| 亚洲一区二区美女| 国产精品久久久久久一区二区三区 | 久久亚区不卡日本| 精品日韩在线一区| 欧美少妇xxx| 一区二区三区国产盗摄 | 99久久综合国产精品| 亚洲国产mv| 一区二区国产日产| 一区精品久久| 久久精品成人一区二区三区蜜臀| 影音先锋久久精品| 亚洲看片一区| 99精品欧美一区二区三区| 亚洲久久在线| 欧美日韩国产电影| 久久久噜噜噜久噜久久综合| 国产喷白浆一区二区三区| 亚洲一区二区中文在线| 亚洲一区二区三区视频在线播放 | 欧美一区二区啪啪| 久久这里只精品最新地址| 日韩精品一区在线| 国产日韩高清在线| 一区二区三区四区在线免费观看 | 欧美三级电影网站| 国产欧美一区二区三区网站| 欧美经典三级视频一区二区三区| 久久一留热品黄| 亚洲国产精品高清| 一区二区三区四区视频精品免费 | 在线播放一区| 欧美老肥妇做.爰bbww视频| 国产欧美一区二区精品秋霞影院| 亚洲国产cao| 欧美精品偷拍| 日韩欧美中文字幕一区| 性感美女极品91精品| 欧美一区精品| 欧美成人video| 美女mm1313爽爽久久久蜜臀| 韩国av一区| 久久色.com| 国产精品夜夜嗨| 欧美日韩成人高清| 亚洲va欧美va人人爽午夜| 国产精品成人观看视频免费| 欧美精品一区二区三区在线播放 | 亚洲欧洲日韩一区二区三区| 欧美在线日韩精品| 欧美日韩电影在线| 国产精品一区三区| 91 com成人网| 丁香网亚洲国际| 日韩午夜小视频| 国产高清一区日本| 久久视频一区二区| 91欧美一区二区| 中文av一区二区| 亚洲精品九九| 日韩激情一区二区| 7777精品伊人久久久大香线蕉经典版下载| 免费久久精品视频| 欧美日韩国产综合久久| 国产精品99久久久久久宅男| 久久综合九色综合久久久精品综合| 成人精品免费网站| 国产欧美日韩久久| 中文高清一区| 六月丁香婷婷色狠狠久久| 91精品国产综合久久国产大片| 97成人超碰视| 蜜桃视频一区二区| 欧美日韩精品电影| 欧美在线影院| 久久www免费人成看片高清| 日韩精品一区二区在线观看| 亚洲国产免费| 韩国精品主播一区二区在线观看 | 在线观看欧美黄色| 欧美a级在线| 国内精品视频一区二区三区八戒| 国产喷白浆一区二区三区| 色噜噜狠狠色综合中国| 99久久99久久精品国产片果冻| 一区二区三区小说| 久久影院电视剧免费观看| 日本道免费精品一区二区三区| 色综合视频在线观看| 国产高清精品在线| 日本人妖一区二区| 亚洲影院免费观看| 国产精品热久久久久夜色精品三区 | 亚洲特色特黄| 色综合视频一区二区三区高清| 久久国产成人午夜av影院| 亚洲综合色丁香婷婷六月图片| 久久九九久久九九| 欧美一区二区久久| 69堂国产成人免费视频| 色噜噜狠狠色综合欧洲selulu| 亚洲特色特黄| 雨宫琴音一区二区在线| 欧美欧美天天天天操| 99视频在线观看一区三区| 国内精品久久久久影院一蜜桃| 喷水一区二区三区| 久久精品国产77777蜜臀| 日韩成人免费电影| 蜜臀99久久精品久久久久久软件| 国产麻豆欧美日韩一区| 久久99久久久欧美国产| 国产一区在线精品| 成人少妇影院yyyy| 欧美.www| 日韩亚洲精品在线| 一区二区三区国产在线| 久久欧美肥婆一二区| 337p亚洲精品色噜噜噜| 久久久午夜精品理论片中文字幕| 国产精品三级av| 日本v片在线高清不卡在线观看| 精品一区二区三区蜜桃| 91在线免费视频观看| 国产精品亚洲一区| 欧美三级电影一区| 日本一区二区三区免费乱视频| 一区二区三区欧美视频| 国产主播一区二区| 在线亚洲欧美| 日韩亚洲欧美高清| 亚洲国产精品久久不卡毛片| 国产精品一二三四五| 激情久久婷婷| 精品国产sm最大网站免费看| 亚洲一区自拍偷拍| 91色九色蝌蚪| 欧美丰满一区二区免费视频| 一区二区在线观看视频| 91啪九色porn原创视频在线观看| 色综合久久久久综合体| 中文字幕精品一区二区精品绿巨人| 奇米影视一区二区三区| 在线看无码的免费网站| 精品av综合导航| 人禽交欧美网站| 亚洲成色精品| 国产欧美精品一区二区色综合| 国产成人自拍在线| 91国偷自产一区二区开放时间 | 亚洲日本护士毛茸茸| 成人av电影观看| 日韩欧美国产午夜精品| 看片的网站亚洲| 欧美日韩情趣电影| 蜜臀av一区二区在线免费观看| 一本色道久久综合狠狠躁的推荐| 亚洲欧美国产77777| 99香蕉国产精品偷在线观看| 久久嫩草精品久久久精品一| 成人一区二区三区视频| 91精品视频网| 99久久99久久精品免费看蜜桃| 久久午夜免费电影| 国产精品国产一区二区| 亚洲黄色在线视频| 免费日韩av| 国产精品羞羞答答xxdd| 久久香蕉国产线看观看99| 欧美日韩国产欧| 五月婷婷激情综合| 欧美日韩国产影片| 欧美日韩精品免费观看| 亚洲蜜桃精久久久久久久| 久久精品一区| 欧美~级网站不卡| 视频一区二区三区在线| 欧美一级黄色录像| 亚洲精品社区|