99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產(chǎn)生活服務(wù)合肥教育合肥招聘合肥旅游文化藝術(shù)合肥美食合肥地圖合肥社保合肥醫(yī)院企業(yè)服務(wù)合肥法律

CSC8204 代寫(xiě)、Secure Software程序

時(shí)間:2023-12-10  來(lái)源:合肥網(wǎng)hfw.cc  作者:hfw.cc 我要糾錯(cuò)



Secure Software Development
Coursework 2023
Aims:
The aim of this assignment is to increase and assess understanding and resolution of risk analysis, SecureUML design, formal modelling and verification.
The coursework consists of 4 equally weighted questions.
Submission details:
Submission deadline: 15 Dec 2023, 15:30
Submit your solution to Ness by the deadline. Your solution should consist of a single .docx or .pdf document with answers to each of the questions below.
Assessment:
The coursework is marked out of 100, with 25 marks for each question . Support:
You will find the formative exercises in Dafny and SecureUML useful for answering the questions in this coursework. After completing these exercises, you can use the remaining practical classes to ask questions.
Questions can also be posted in the Canvas discussion board.
Scenario:
This coursework is derived from the Tokeneer ID Station, a research project undertaken in 2008 by Altran Praxis (formerly Praxis Critical Systems). The project was to demonstrate the development of secure systems in a rigorous manner, and the final report1 provides an overview of the project documentation, including requirements analysis, formal specification (in Z), SPARK Ada implementation and verification, and top-down system testing.
Tokeneer is described as a “biometrics prototype”. The Tokeneer ID Station or TIS, one part of the Tokeneer System, protects access to secure information held on a network of workstations, held in a physically secure space or “enclave”.
1 Available from AdaCore at http://www.adacore.com/uploads/downloads/Tokeneer_Report.pdf
  
 Figure 1 Tokeneer system overview
The Tokeneer system displayed in Figure 1 consists of the secure enclave plus other components that are physically either inside or outside the enclave:
• Enrolment Station issues a token to a user. The token contains up to four signed certificates: an ID Certificate generated by a Certificate Authority; a Privilege Certificate and a biometric Identification and Authentication (I&A) Certificate, both generated by an Attribute Authority; and an Authorisation Certificate which is generated by the TIS, as described below.
• Tokeneer ID Station (TIS) uses the biometric information in the I&A certificate, and scan of the user’s fingerprint, to verify the user. On successful identification, if the Privilege Certificate confirms the user has sufficient clearance, the TIS adds a signed Authorisation Certificate to the user’s token and releases the enclave door lock, allowing entrance to the secure space.
• Inside the secure space (enclave) are a number of Workstations. A workstation checks the Authorisation Certificate to confirm the user is currently authorised to use the workstation facilities.

Part A Applied Risk Analysis [25 Marks]
According to McGraw’s software security approach, the secure software development is founded on a comprehensive applied risk analysis taking into account business goals, business risks, and technical risks.
Aim:
Develop an applied risk analysis based on the documentation of the Tokeneer project (http://www.adacore.com/uploads/downloads/Tokeneer_Report.pdf).
Approach:
Develop the risk analysis based on McGraw’s methodology introduced in the recommended literature McGraw – Software Security and in the lecture on Principles of Software Security.
Evaluate:
1. Business goals of Praxis High Integrity Systems in undertaking the Tokeneer project. Rank the business goals according to the NIST business goal classification.
2. Three main business risks affecting Praxis High Integrity Systems, including: • Business risk indicator
• NIST business risk likelihood scaling
• NIST business risk impact scaling
• Overall NIST severity ranking.
• A one-sentence rationale, why you have chosen this risk over others.
3. Five main technical risks determinable from the Tokeneer report and software
deliverable.
• Analyze the software artifacts
• Evaluate the software security touchpoints
• Use the 10 best practice security principles by McGraw.
• Specify the risk likelihood and possible impact vis-à-vis of available controls.
• Write a one-sentence rationale, why you have chosen this risk over others.
4. Conduct a risk synthesis connecting business goals, business risks and technical risks.
5. Derive one mitigation approach for each technical risk. Justify your choice.
Deliverable:
To complete this part of the coursework, complete an applied risk management report that enumerates the risk register in the tabular form introduced by McGraw and in the lecture on Principles of Software Security. Examples for such tables are given in the lecture slides, slides 2**9.
In addition to the risk register, document the rationale for the risks and the chosen mitigation methods in a brief summary, no more than one side A4.
Ultimately, the coherence and consistency of your argument for your choices will be key in achieving high marks. The risks and mitigation methods must fit the indicated Tokeneer scenario.
Indicative marking guidance: business goals and risks [5 Marks], technical risks [10 Marks], risk synthesis and mitigation [5 Marks], rationale [5 Marks].
    
Part B SecureUML Design [25 Marks]
Model-driven security (MDS) embeds security controls into generated source code and enables formal verification. We investigate SecureUML as a an MDS approach that enables enforcement of confidentiality and integrity through Role-Based Access Control (RBAC).
Aim:
Develop a high-level UML model in the style of SecureUML which models a suitable security policy for the Tokeneer ID station.
 Figure 2 SecureUML Metamodel
Approach:
Create an UML Class model that takes the SecureUML metamodel shown in Figure 2 as foundation and models as a mock-up the defined security policy. Do this in IntelliJ IDEA Diagrams or another appropriate UML modelling software (e.g., Papyrus or Eclipse Modelling).
Design:
Design an UML diagram in the fashion of SecureUML to model the following authentication system: The system manages the certificate handling of the Tokeneer ID station, including (i) how superusers can grant and revoke certificates, (ii) how certificates are derived from one another, and (iii) how an enclave user can log in to and be logged out from workstations.
Create a UML design to capture the following security policy: Subjects = { Alice, Bob, Administrator }; Roles = { EnclaveUser, Superuser }; Actions = { Grant, Revoke, Open, Login, Logout }; Resources = { Workstation, TIS, IDCertificate, IACertificate, PrivilegeCertificate, AuthorizationCertificate } Any user can login to a workstation if the user has an AuthorizationCertificate. Certificates are derived/enforced by the TIS based on the rules highlighted above. A superuser can grant/revoke any certificate and logout any user.
Deliverable:
A UML model that establishes an appropriate RBAC policy according to the SecureUML methodology. It is sufficient to submit a UML class diagrams (incl. dialect design), but not required to design an UML profile. Submit a report displaying your class diagrams along with a rationale for your design, no more than one side A4.
Indicative marking guideline: System, RBAC and dialect UML design [18 Marks]; Rationale [7 Marks]. It is sufficient to capture SecureUML elements conceptually.

Part C Formal Modelling [25 marks]
The Dafny file tokeneer.dfy2 has the beginning of an abstract formal model of part of the tokeneer system in Dafny. The model is not intended to be executable. Your task is to extend the model by answering the questions below.
Aim:
Develop an extended model of the tokeneer certificates and tokens. You do not need to provide
data to test your model. The aim of the exercise is to expand and refine the model specification.
Approach:
Follow the guidelines given in the questions below to extend the model.
The model consists of some abstract datatype definitions, some functions, predicates and methods, and some traits and classes. A trait in dafny is similar to an abstract class or interface in java: dafny requires that a class can only extend a trait, it cannot extend another class. This means that we use traits to define superclasses. See for example the trait Certificate which is extended by the class IDCert.
The key difference between a trait and a class is that a trait does not have a constructor defined. A class must have a constructor: however, as can be seen in the model, the constructor can be unspecified in an abstract model.
Deliverable:
A revised Dafny model for the tokens and certificates part of the tokeneer system. Include the full content of your Dafny file (as text, not as a screenshot image) in your report. You can format it as follows (by copying and pasting the content of your .dfy file into your word document):
/*
Solution to CSC8204 Coursework Part C
*/
 // basic types
type optional<T> = ts: set<T> | |ts| <= 1 type TIME = nat
 Questions:
1) Clearance class. Find the definition of Clearance, which has a single field (cClass) represented by the enumerated type CLEARANCE_CLASS. A newly created Clearance object will initially have the value unmarked.
a) Add a postcondition (ensures) to the constructor to record this. [2 marks] 2 The model is available as tokeneer.dfy in the repository https://github.com/SteveR-Ncl/CSC8204-Dafny
  
A ghost function minClearance has been specified. It should return the minimum of two Clearance objects, ie Clearance(a,b) will return a if the object a has a lower clearance than b. “Lower” is implied by the ordering of the enumeration, ie unmarked < unclassified < restricted etc.
b) Complete the definition of ghost function minClearance to return the minimum clearance object as described above. Use c1.cClass to access the value of the cClass field in the object c1. Hint: you will need to use a reads clause as described in the lecture.
[4 marks]
2) Admin Privilege. A user can have one of 4 privileges, as shown by the enumerated datatype definition PRIVILEGE. Only the admin roles (guard, auditManager, securityOfficer) have any admin operations available to them, as follows:
• A guard can use the overrideLock operation
• An auditManager can use the archiveLog operation
• A securityOfficer can use the updateData and shutdownOp operations
a) Modify your model to add a new enumerated datatype called ADMINOP, with values representing the four operations above (overrideLock, etc) [2 marks]
b) Add a function with signature as follows:
function availableOps(p: PRIVILEGE): set<ADMINOP>
Provide a function body which returns the set of operations available to a user with privilege level p. [8 marks]
3) Token Predicates. A token class is defined in the model. It has fields for the tokenID and up to 4 certificates held on the token (ID Certificate, Privilege Certificate, I and A Certificate, and (optionally) Authorisation Certificate. Each certificate has its own ID; the Privilege, I and A and Authorisation Certificates also contain the ID of the token and the ID of the ID certificate. There are 3 predicate functions to define in the token class: ValidToken(), TokenWithValidAuth(), CurrentToken(TIME).
Complete the predicate functions using the following definitions:
• A Valid Token has Privilege and I and A certificates correctly cross-referencing the ID Certificate and TokenID. It need not have a valid Authorisation certificate.
• A Token with a Valid Authorisation must have an Authorisation certificate, and must have correct cross-reference to the token ID and ID certificate’s ID
• A Current Token is defined using input parameter now, representing the current time. A current token is a Valid Token where all the certificates are current, ie the current time is included in the validityPeriods for each of the id certificate, privilege certificate and I and A certificates.
Hint: set notation may be helpful here. Use a in B to express that a is a member of set B, and B * C to indicate intersection of sets B and C. [9 marks]

Part D [25 marks]
This question makes use of the Floyd-Hoare logic to analyse code samples and investigate whether they can be formally verified, using the approach described in the lectures on Program Verification.
Aim:
The question assesses skill and understanding in formal verification, weakest precondition semantics and Floyd-Hoare logic.
Deliverable:
Provide your answers to all the questions in Part D of you submission document.
Questions
For each of the two code samples shown, use the weakest precondition approach to derive any necessary precondition in order to prove that the code is partially correct with respect to the specification. Sample 2 uses information derived from the tokeneer scenario.
Be sure to show each step in the derivation and indicate which proof rules have been used.
1) Sums method [10 marks]
 method Sums(x: int, y: int) returns (m: int, n: int) ensures m > n
{
    var a: int;
    m := x;
    n := y;
    a := 2 * m + n;
    n := n - 1;
m := a; }
2) UpdateAlarms method [15 marks]
datatype ALARM = silent | alarming
method UpdateAlarms(doorAlarm: ALARM, auditAlarm: ALARM) returns (alarm: ALARM) ensures (alarm == alarming) <==>
 (doorAlarm == alarming) || (auditAlarm == alarming)
 {
if doorAlarm == alarming || auditAlarm == alarming
{ alarm := alarming; }
else
{ alarm := silent ;} }
 請(qǐng)加QQ:99515681 或郵箱:99515681@qq.com   WX:codehelp

掃一掃在手機(jī)打開(kāi)當(dāng)前頁(yè)
  • 上一篇:CON3602 代做、代寫(xiě) java 語(yǔ)言編程
  • 下一篇:代做ECM2418、代寫(xiě) java,Python 程序設(shè)計(jì)
  • 無(wú)相關(guān)信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
    急尋熱仿真分析?代做熱仿真服務(wù)+熱設(shè)計(jì)優(yōu)化
    出評(píng) 開(kāi)團(tuán)工具
    出評(píng) 開(kāi)團(tuán)工具
    挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
    挖掘機(jī)濾芯提升發(fā)動(dòng)機(jī)性能
    海信羅馬假日洗衣機(jī)亮相AWE  復(fù)古美學(xué)與現(xiàn)代科技完美結(jié)合
    海信羅馬假日洗衣機(jī)亮相AWE 復(fù)古美學(xué)與現(xiàn)代
    合肥機(jī)場(chǎng)巴士4號(hào)線(xiàn)
    合肥機(jī)場(chǎng)巴士4號(hào)線(xiàn)
    合肥機(jī)場(chǎng)巴士3號(hào)線(xiàn)
    合肥機(jī)場(chǎng)巴士3號(hào)線(xiàn)
    合肥機(jī)場(chǎng)巴士2號(hào)線(xiàn)
    合肥機(jī)場(chǎng)巴士2號(hào)線(xiàn)
    合肥機(jī)場(chǎng)巴士1號(hào)線(xiàn)
    合肥機(jī)場(chǎng)巴士1號(hào)線(xiàn)
  • 短信驗(yàn)證碼 豆包 幣安下載 AI生圖 目錄網(wǎng)

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                av日韩在线网站| 欧美一区二区三区免费大片| 欧美性受极品xxxx喷水| 亚洲男帅同性gay1069| 色嗨嗨av一区二区三区| 亚洲国产精品一区二区www在线| 欧美亚洲精品一区| 青娱乐精品视频| 久久久激情视频| 91福利资源站| 国产在线视视频有精品| 亚洲欧美电影一区二区| 欧美一区二区三区影视| 99久久精品久久久久久清纯| 亚欧色一区w666天堂| 久久久精品天堂| 欧美在线观看一二区| 国精产品一区一区三区mba视频| 国产精品久久久久婷婷二区次| 91久久精品国产91性色tv| 美腿丝袜一区二区三区| 亚洲三级免费电影| 欧美成人国产一区二区| 在线视频欧美区| 国产一区二区按摩在线观看| 午夜av一区二区三区| 中文字幕在线免费不卡| 精品久久久久一区| 欧美色图天堂网| 精品无人区卡一卡二卡三乱码免费卡| 亚洲人精品午夜| 欧美经典一区二区| 日韩欧美自拍偷拍| 欧美久久久久久蜜桃| 91麻豆精品在线观看| 韩国午夜理伦三级不卡影院| 日韩国产欧美在线观看| 亚洲国产视频一区| 亚洲女同一区二区| 自拍视频在线观看一区二区| 久久精品亚洲麻豆av一区二区 | 亚洲国产精品成人综合色在线婷婷 | 国产精品麻豆一区二区| 日韩欧美aaaaaa| 亚洲精品久久久久久国产精华液| 欧美不卡视频一区| 日本欧美一区二区| 欧美国产精品中文字幕| 欧美日韩亚洲丝袜制服| 成人av免费观看| 国产在线不卡一区| 国产乱码字幕精品高清av | 精品一区二区av| 免费看精品久久片| 午夜精品久久久久久久99水蜜桃 | 国产精品女同一区二区三区| 久久久久久久综合| 久久午夜色播影院免费高清| 久久欧美中文字幕| 国产欧美一区二区三区鸳鸯浴| 国产日韩欧美不卡| 亚洲免费资源在线播放| 亚洲成av人片在线| 看电视剧不卡顿的网站| 国产精品自拍av| 91猫先生在线| 日韩一区二区三区电影在线观看| www久久精品| 国产精品久久久久久久午夜片| 亚洲欧美中日韩| 亚洲福利一区二区三区| 久久99久久精品欧美| 成人免费福利片| 欧美日本一区二区| 久久综合九色综合97_久久久| 国产精品美女一区二区三区| 一区二区免费看| 久久精品免费观看| 一本一道久久a久久精品综合蜜臀| 欧美日产国产精品| 欧美国产一区在线| 亚洲国产精品久久一线不卡| 国产精品综合网| 欧美日韩国产成人在线91| 欧美精品一区二区久久久| 亚洲精品成人在线| 九色综合国产一区二区三区| 91碰在线视频| 日韩精品一区二区三区在线播放| 亚洲欧洲国产专区| 美女一区二区三区| 欧美午夜免费电影| 国产精品久线在线观看| 蜜乳av一区二区三区| 色狠狠av一区二区三区| 精品99久久久久久| 亚洲一卡二卡三卡四卡五卡| 高清国产一区二区| 欧美成人一区二区三区片免费| 亚洲欧美日韩一区二区三区在线观看| 男男成人高潮片免费网站| 色婷婷综合五月| 国产精品久久三区| 国产精品综合在线视频| 91精品黄色片免费大全| 一区二区三区高清| 波多野结衣欧美| 国产午夜三级一区二区三| 麻豆国产欧美日韩综合精品二区| 在线观看视频欧美| 亚洲日本在线a| 成人伦理片在线| 国产日韩影视精品| 国产精品一区专区| 欧美精品一区男女天堂| 理论片日本一区| 欧美一区二区精品在线| 日日夜夜一区二区| 在线成人免费视频| 偷拍与自拍一区| 91精品国产综合久久婷婷香蕉 | 日日骚欧美日韩| 欧美日韩午夜在线视频| 亚洲影院久久精品| 在线精品视频免费播放| 一区二区免费在线| 欧美色男人天堂| 日韩影院在线观看| 欧美成人乱码一区二区三区| 美国精品在线观看| 日韩欧美中文字幕公布| 国产一区二区在线观看免费| 久久免费看少妇高潮| 国产精品1024久久| 亚洲色图欧洲色图| 欧美日韩免费在线视频| 人人狠狠综合久久亚洲| 日韩一区二区三区视频| 国产美女主播视频一区| 亚洲日本va午夜在线影院| 色综合久久综合网| 舔着乳尖日韩一区| 337p日本欧洲亚洲大胆色噜噜| 国模冰冰炮一区二区| 国产精品不卡在线| 欧美亚日韩国产aⅴ精品中极品| 日本大胆欧美人术艺术动态| 精品国产sm最大网站免费看| 成人午夜私人影院| 亚洲国产欧美一区二区三区丁香婷| 欧美老年两性高潮| 国产成人免费视频网站| 亚洲最大的成人av| 精品国产免费视频| 色香蕉久久蜜桃| 久久99九九99精品| 亚洲精品一卡二卡| 久久久久综合网| 欧美天堂一区二区三区| 国产露脸91国语对白| 亚洲国产精品影院| 亚洲国产成人午夜在线一区| 91国偷自产一区二区三区观看 | 午夜精品成人在线视频| 国产亚洲欧美日韩俺去了| 欧美午夜精品免费| 国产成人av电影在线观看| 亚洲一区二区精品久久av| 久久久另类综合| 在线不卡中文字幕| 一本大道久久a久久综合| 韩国av一区二区三区四区| 亚洲综合偷拍欧美一区色| 国产欧美视频在线观看| 欧美一区二区三区四区五区| 99国产精品久久久久久久久久| 麻豆91免费看| 亚洲va韩国va欧美va| 国产精品成人免费在线| 精品国产免费人成电影在线观看四季 | 欧美久久久久久久久中文字幕| 国产成人av在线影院| 精品亚洲porn| 日本不卡视频一二三区| 亚洲一区二区三区中文字幕| 中文字幕视频一区| 国产农村妇女毛片精品久久麻豆| 日韩欧美一二三| 欧美一卡二卡在线| 制服丝袜日韩国产| 欧美私模裸体表演在线观看| 92国产精品观看| 成人av动漫在线| 99久久久精品免费观看国产蜜| 国产成a人亚洲精品| 韩国女主播成人在线观看| 美女久久久精品| 韩国三级电影一区二区| 国产九色sp调教91| 国产大陆a不卡|