国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務合肥法律

CSC8204 代寫、Secure Software程序

時間:2023-12-10  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



Secure Software Development
Coursework 2023
Aims:
The aim of this assignment is to increase and assess understanding and resolution of risk analysis, SecureUML design, formal modelling and verification.
The coursework consists of 4 equally weighted questions.
Submission details:
Submission deadline: 15 Dec 2023, 15:30
Submit your solution to Ness by the deadline. Your solution should consist of a single .docx or .pdf document with answers to each of the questions below.
Assessment:
The coursework is marked out of 100, with 25 marks for each question . Support:
You will find the formative exercises in Dafny and SecureUML useful for answering the questions in this coursework. After completing these exercises, you can use the remaining practical classes to ask questions.
Questions can also be posted in the Canvas discussion board.
Scenario:
This coursework is derived from the Tokeneer ID Station, a research project undertaken in 2008 by Altran Praxis (formerly Praxis Critical Systems). The project was to demonstrate the development of secure systems in a rigorous manner, and the final report1 provides an overview of the project documentation, including requirements analysis, formal specification (in Z), SPARK Ada implementation and verification, and top-down system testing.
Tokeneer is described as a “biometrics prototype”. The Tokeneer ID Station or TIS, one part of the Tokeneer System, protects access to secure information held on a network of workstations, held in a physically secure space or “enclave”.
1 Available from AdaCore at http://www.adacore.com/uploads/downloads/Tokeneer_Report.pdf
  
 Figure 1 Tokeneer system overview
The Tokeneer system displayed in Figure 1 consists of the secure enclave plus other components that are physically either inside or outside the enclave:
• Enrolment Station issues a token to a user. The token contains up to four signed certificates: an ID Certificate generated by a Certificate Authority; a Privilege Certificate and a biometric Identification and Authentication (I&A) Certificate, both generated by an Attribute Authority; and an Authorisation Certificate which is generated by the TIS, as described below.
• Tokeneer ID Station (TIS) uses the biometric information in the I&A certificate, and scan of the user’s fingerprint, to verify the user. On successful identification, if the Privilege Certificate confirms the user has sufficient clearance, the TIS adds a signed Authorisation Certificate to the user’s token and releases the enclave door lock, allowing entrance to the secure space.
• Inside the secure space (enclave) are a number of Workstations. A workstation checks the Authorisation Certificate to confirm the user is currently authorised to use the workstation facilities.

Part A Applied Risk Analysis [25 Marks]
According to McGraw’s software security approach, the secure software development is founded on a comprehensive applied risk analysis taking into account business goals, business risks, and technical risks.
Aim:
Develop an applied risk analysis based on the documentation of the Tokeneer project (http://www.adacore.com/uploads/downloads/Tokeneer_Report.pdf).
Approach:
Develop the risk analysis based on McGraw’s methodology introduced in the recommended literature McGraw – Software Security and in the lecture on Principles of Software Security.
Evaluate:
1. Business goals of Praxis High Integrity Systems in undertaking the Tokeneer project. Rank the business goals according to the NIST business goal classification.
2. Three main business risks affecting Praxis High Integrity Systems, including: • Business risk indicator
• NIST business risk likelihood scaling
• NIST business risk impact scaling
• Overall NIST severity ranking.
• A one-sentence rationale, why you have chosen this risk over others.
3. Five main technical risks determinable from the Tokeneer report and software
deliverable.
• Analyze the software artifacts
• Evaluate the software security touchpoints
• Use the 10 best practice security principles by McGraw.
• Specify the risk likelihood and possible impact vis-à-vis of available controls.
• Write a one-sentence rationale, why you have chosen this risk over others.
4. Conduct a risk synthesis connecting business goals, business risks and technical risks.
5. Derive one mitigation approach for each technical risk. Justify your choice.
Deliverable:
To complete this part of the coursework, complete an applied risk management report that enumerates the risk register in the tabular form introduced by McGraw and in the lecture on Principles of Software Security. Examples for such tables are given in the lecture slides, slides 2**9.
In addition to the risk register, document the rationale for the risks and the chosen mitigation methods in a brief summary, no more than one side A4.
Ultimately, the coherence and consistency of your argument for your choices will be key in achieving high marks. The risks and mitigation methods must fit the indicated Tokeneer scenario.
Indicative marking guidance: business goals and risks [5 Marks], technical risks [10 Marks], risk synthesis and mitigation [5 Marks], rationale [5 Marks].
    
Part B SecureUML Design [25 Marks]
Model-driven security (MDS) embeds security controls into generated source code and enables formal verification. We investigate SecureUML as a an MDS approach that enables enforcement of confidentiality and integrity through Role-Based Access Control (RBAC).
Aim:
Develop a high-level UML model in the style of SecureUML which models a suitable security policy for the Tokeneer ID station.
 Figure 2 SecureUML Metamodel
Approach:
Create an UML Class model that takes the SecureUML metamodel shown in Figure 2 as foundation and models as a mock-up the defined security policy. Do this in IntelliJ IDEA Diagrams or another appropriate UML modelling software (e.g., Papyrus or Eclipse Modelling).
Design:
Design an UML diagram in the fashion of SecureUML to model the following authentication system: The system manages the certificate handling of the Tokeneer ID station, including (i) how superusers can grant and revoke certificates, (ii) how certificates are derived from one another, and (iii) how an enclave user can log in to and be logged out from workstations.
Create a UML design to capture the following security policy: Subjects = { Alice, Bob, Administrator }; Roles = { EnclaveUser, Superuser }; Actions = { Grant, Revoke, Open, Login, Logout }; Resources = { Workstation, TIS, IDCertificate, IACertificate, PrivilegeCertificate, AuthorizationCertificate } Any user can login to a workstation if the user has an AuthorizationCertificate. Certificates are derived/enforced by the TIS based on the rules highlighted above. A superuser can grant/revoke any certificate and logout any user.
Deliverable:
A UML model that establishes an appropriate RBAC policy according to the SecureUML methodology. It is sufficient to submit a UML class diagrams (incl. dialect design), but not required to design an UML profile. Submit a report displaying your class diagrams along with a rationale for your design, no more than one side A4.
Indicative marking guideline: System, RBAC and dialect UML design [18 Marks]; Rationale [7 Marks]. It is sufficient to capture SecureUML elements conceptually.

Part C Formal Modelling [25 marks]
The Dafny file tokeneer.dfy2 has the beginning of an abstract formal model of part of the tokeneer system in Dafny. The model is not intended to be executable. Your task is to extend the model by answering the questions below.
Aim:
Develop an extended model of the tokeneer certificates and tokens. You do not need to provide
data to test your model. The aim of the exercise is to expand and refine the model specification.
Approach:
Follow the guidelines given in the questions below to extend the model.
The model consists of some abstract datatype definitions, some functions, predicates and methods, and some traits and classes. A trait in dafny is similar to an abstract class or interface in java: dafny requires that a class can only extend a trait, it cannot extend another class. This means that we use traits to define superclasses. See for example the trait Certificate which is extended by the class IDCert.
The key difference between a trait and a class is that a trait does not have a constructor defined. A class must have a constructor: however, as can be seen in the model, the constructor can be unspecified in an abstract model.
Deliverable:
A revised Dafny model for the tokens and certificates part of the tokeneer system. Include the full content of your Dafny file (as text, not as a screenshot image) in your report. You can format it as follows (by copying and pasting the content of your .dfy file into your word document):
/*
Solution to CSC8204 Coursework Part C
*/
 // basic types
type optional<T> = ts: set<T> | |ts| <= 1 type TIME = nat
 Questions:
1) Clearance class. Find the definition of Clearance, which has a single field (cClass) represented by the enumerated type CLEARANCE_CLASS. A newly created Clearance object will initially have the value unmarked.
a) Add a postcondition (ensures) to the constructor to record this. [2 marks] 2 The model is available as tokeneer.dfy in the repository https://github.com/SteveR-Ncl/CSC8204-Dafny
  
A ghost function minClearance has been specified. It should return the minimum of two Clearance objects, ie Clearance(a,b) will return a if the object a has a lower clearance than b. “Lower” is implied by the ordering of the enumeration, ie unmarked < unclassified < restricted etc.
b) Complete the definition of ghost function minClearance to return the minimum clearance object as described above. Use c1.cClass to access the value of the cClass field in the object c1. Hint: you will need to use a reads clause as described in the lecture.
[4 marks]
2) Admin Privilege. A user can have one of 4 privileges, as shown by the enumerated datatype definition PRIVILEGE. Only the admin roles (guard, auditManager, securityOfficer) have any admin operations available to them, as follows:
• A guard can use the overrideLock operation
• An auditManager can use the archiveLog operation
• A securityOfficer can use the updateData and shutdownOp operations
a) Modify your model to add a new enumerated datatype called ADMINOP, with values representing the four operations above (overrideLock, etc) [2 marks]
b) Add a function with signature as follows:
function availableOps(p: PRIVILEGE): set<ADMINOP>
Provide a function body which returns the set of operations available to a user with privilege level p. [8 marks]
3) Token Predicates. A token class is defined in the model. It has fields for the tokenID and up to 4 certificates held on the token (ID Certificate, Privilege Certificate, I and A Certificate, and (optionally) Authorisation Certificate. Each certificate has its own ID; the Privilege, I and A and Authorisation Certificates also contain the ID of the token and the ID of the ID certificate. There are 3 predicate functions to define in the token class: ValidToken(), TokenWithValidAuth(), CurrentToken(TIME).
Complete the predicate functions using the following definitions:
• A Valid Token has Privilege and I and A certificates correctly cross-referencing the ID Certificate and TokenID. It need not have a valid Authorisation certificate.
• A Token with a Valid Authorisation must have an Authorisation certificate, and must have correct cross-reference to the token ID and ID certificate’s ID
• A Current Token is defined using input parameter now, representing the current time. A current token is a Valid Token where all the certificates are current, ie the current time is included in the validityPeriods for each of the id certificate, privilege certificate and I and A certificates.
Hint: set notation may be helpful here. Use a in B to express that a is a member of set B, and B * C to indicate intersection of sets B and C. [9 marks]

Part D [25 marks]
This question makes use of the Floyd-Hoare logic to analyse code samples and investigate whether they can be formally verified, using the approach described in the lectures on Program Verification.
Aim:
The question assesses skill and understanding in formal verification, weakest precondition semantics and Floyd-Hoare logic.
Deliverable:
Provide your answers to all the questions in Part D of you submission document.
Questions
For each of the two code samples shown, use the weakest precondition approach to derive any necessary precondition in order to prove that the code is partially correct with respect to the specification. Sample 2 uses information derived from the tokeneer scenario.
Be sure to show each step in the derivation and indicate which proof rules have been used.
1) Sums method [10 marks]
 method Sums(x: int, y: int) returns (m: int, n: int) ensures m > n
{
    var a: int;
    m := x;
    n := y;
    a := 2 * m + n;
    n := n - 1;
m := a; }
2) UpdateAlarms method [15 marks]
datatype ALARM = silent | alarming
method UpdateAlarms(doorAlarm: ALARM, auditAlarm: ALARM) returns (alarm: ALARM) ensures (alarm == alarming) <==>
 (doorAlarm == alarming) || (auditAlarm == alarming)
 {
if doorAlarm == alarming || auditAlarm == alarming
{ alarm := alarming; }
else
{ alarm := silent ;} }
 請加QQ:99515681 或郵箱:99515681@qq.com   WX:codehelp

掃一掃在手機打開當前頁
  • 上一篇:CON3602 代做、代寫 java 語言編程
  • 下一篇:代做ECM2418、代寫 java,Python 程序設計
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科技CAE仿真
    流體仿真外包多少錢_專業(yè)CFD分析代做_友商科
    CAE仿真分析代做公司 CFD流體仿真服務 管路流場仿真外包
    CAE仿真分析代做公司 CFD流體仿真服務 管路
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真技術服務
    流體CFD仿真分析_代做咨詢服務_Fluent 仿真
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲勞振動
    結構仿真分析服務_CAE代做咨詢外包_剛強度疲
    流體cfd仿真分析服務 7類仿真分析代做服務40個行業(yè)
    流體cfd仿真分析服務 7類仿真分析代做服務4
    超全面的拼多多電商運營技巧,多多開團助手,多多出評軟件徽y1698861
    超全面的拼多多電商運營技巧,多多開團助手
    CAE有限元仿真分析團隊,2026仿真代做咨詢服務平臺
    CAE有限元仿真分析團隊,2026仿真代做咨詢服
    釘釘簽到打卡位置修改神器,2026怎么修改定位在范圍內
    釘釘簽到打卡位置修改神器,2026怎么修改定
  • 短信驗證碼 寵物飼養(yǎng) 十大衛(wèi)浴品牌排行 suno 豆包網頁版入口 目錄網 排行網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    国产人妻人伦精品_欧美一区二区三区图_亚洲欧洲久久_日韩美女av在线免费观看
    日本精品久久久| 手机看片日韩国产| 色综合导航网站| 欧洲成人一区二区| 久久人妻精品白浆国产| 亚洲精品一区国产精品| 国产在线观看不卡| 国产精品久久久久99| 欧美性大战久久久久xxx| 国产激情999| 色就是色欧美| www国产免费| 欧美激情精品久久久久久黑人| 欧美成人高潮一二区在线看| zzjj国产精品一区二区| 日韩精品一区二区三区外面| 久久久久久久久久久网站| 日本精品免费在线观看| 国产盗摄xxxx视频xxx69| 国产高清在线一区| 亚洲视频在线二区| 久久久久久久有限公司| 蜜桃视频成人| 亚洲精品免费一区二区三区| 日韩在线免费视频| 国产日本欧美在线| 亚洲一区不卡在线| 日韩中文字幕视频在线| 国产女人水真多18毛片18精品| 无码人妻h动漫| 国产精品情侣自拍| 91国内揄拍国内精品对白| 激情图片qvod| 欧美一区二区三区图| 国产精品美女999| 97伦理在线四区| 黄色国产一级视频| 午夜精品视频在线观看一区二区| 国产精品无av码在线观看| 99久久国产免费免费| 欧美日韩国产综合在线| 久久久久久成人| 国产精品丝袜一区二区三区| 91精品久久久久久蜜桃| 麻豆精品传媒视频| 日韩精品免费一区| 亚洲一区二区久久久久久久| 国产精品嫩草影院一区二区| 久久综合狠狠综合久久综青草| 国模极品一区二区三区| 日韩av影视| 自拍视频一区二区三区| 国产精品极品尤物在线观看| 久久av免费观看| 99久久99久久| 国产欧美精品一区二区| 日韩人妻精品一区二区三区| 一本色道久久综合亚洲精品婷婷 | 久久色在线播放| 91精品国产九九九久久久亚洲| 国产在线视频91| 欧美亚洲国产视频| 日本午夜一区二区三区| 欧美人成在线视频| 国产精品福利观看| 久久精品亚洲热| 国产av熟女一区二区三区 | 亚洲一区三区视频在线观看| 伦理中文字幕亚洲| 久久精品视频在线观看| 日韩在线视频播放| 国产成人a亚洲精品| 国产精品av免费| 91精品黄色| 99高清视频有精品视频| 高清一区二区三区日本久| 国产欧美日韩综合精品二区| 国产淫片av片久久久久久| 激情内射人妻1区2区3区| 欧美日韩精品免费在线观看视频| 日韩精品最新在线观看| 日韩久久在线| 日本精品视频在线播放| 天天综合色天天综合色hd| 午夜久久资源| 天堂一区二区三区| 日本欧美黄网站| 日本久久高清视频| 日韩欧美在线一区二区| 人偷久久久久久久偷女厕| 日本精品免费| 欧美中日韩一区二区三区| 欧美在线不卡区| 精品欧美一区免费观看α√| 韩国三级日本三级少妇99| 含羞草久久爱69一区| 国内精品美女av在线播放| 蜜桃久久影院| 国产日韩亚洲欧美| 国产精品亚洲a| 2019日韩中文字幕mv| 国产成人精品日本亚洲专区61| 久操网在线观看| 国产精品视频久久久久| 国产精品成人av性教育| 欧美激情视频一区二区三区不卡 | 高清不卡一区二区三区| av一区观看| 久久美女福利视频| 久久精品2019中文字幕| 国产精品二区二区三区| 九九热在线精品视频| 亚洲人成77777| 日韩视频在线免费播放| 欧美极品视频一区二区三区| 国产在线观看一区二区三区| 成人国产亚洲精品a区天堂华泰| 99久久自偷自偷国产精品不卡 | 日韩精品在线视频免费观看| 欧美激情亚洲天堂| 国产日韩精品久久| 91久久久久久久一区二区| 国产高清免费在线| 国产精品三级久久久久久电影 | 欧美日产一区二区三区在线观看| 国产又黄又大又粗视频| 91精品久久久久久久久久久久久| 国产xxxxx视频| 另类专区欧美制服同性| 午夜精品三级视频福利| 欧美凹凸一区二区三区视频| 国产精品亚洲一区二区三区| 久久精品二区| 精品中文字幕在线观看| 色女人综合av| 免费av网址在线| 91九色蝌蚪成人| 国产精品视频500部| 亚洲综合精品伊人久久| 人偷久久久久久久偷女厕| 国产欧美久久久久| 久草精品电影| 九色91av视频| 热久久精品国产| 成人动漫在线观看视频| 国产精品无码免费专区午夜| 亚洲一区二区精品在线观看| 精品欧美一区二区在线观看视频| 91久久久国产精品| 久久福利视频网| 奇米成人av国产一区二区三区| 国产伦精品一区二区三区照片91| 久久精品第九区免费观看| 欧美激情网站在线观看| 奇米四色中文综合久久| 99热久久这里只有精品| 国产精品传媒毛片三区| 青青草免费在线视频观看| 91久久精品视频| 精品国产免费人成电影在线观... 精品国产免费一区二区三区 | 国产精品久久91| 欧美一区二区视频97| 国产中文字幕亚洲| 国产成人aa精品一区在线播放| 欧美激情视频网站| 极品尤物一区二区三区| 国产成人亚洲综合91| 亚洲最大av在线| 国产三区二区一区久久| 国产精品无码乱伦| 日本欧美国产在线| 91精品久久久久久久久久久久久久| 欧美精品在线观看| 欧美 日韩 国产在线观看| 91精品国产一区| 一区二区三区四区久久| 激情一区二区三区| 日日噜噜噜夜夜爽亚洲精品| 水蜜桃亚洲精品| 91久色国产| 亚洲视频在线观看日本a| 国产伦精品一区二区三区照片 | 激情五月六月婷婷| 精品国产欧美一区二区五十路| 欧美一区二区高清在线观看| 91精品国产高清久久久久久91| 欧美激情小视频| 国产日韩在线看片| 国产精品国产三级欧美二区| 欧美在线视频观看| 久久久久久久影院| 日韩免费观看网站| 久久艹中文字幕| 日韩精品av一区二区三区| 色婷婷综合久久久久中文字幕1| 日本一本草久p| 久久久久一本一区二区青青蜜月| 天天摸天天碰天天添| 久久久亚洲精品无码| 天天久久人人|