Validation and approval of PN ciphered subnets: Security in PN sharing and storage using PNML, xmlsecurity and xmlsignature

  1. Samaniego, I.L. 1
  2. Perez-Parte, M. 1
  3. Latorre-Biel, J.-I. 1
  4. Jiménez-Macías, E. 1
  1. 1 Universidad de La Rioja
    info

    Universidad de La Rioja

    Logroño, España

    ROR https://ror.org/0553yr311

Libro:
27th European Modeling and Simulation Symposium, EMSS 2015

ISBN: 9788897999485

Año de publicación: 2015

Páginas: 349-358

Tipo: Capítulo de Libro

Resumen

In this work I board the study of Petri nets from the point of view of the security. There several goals. First of all, I will take advantage from my previous work in order to complete a subnetting process. Then, the creation of a PNML extension that allows the representation of subnets structures. One application of this subnetting and PNML representation is the possibility of hiding part of a Petri net, facing a possible distribution, maintaining the privacy of the critical, secret, or complex parts of the system. However this hidden information is not eliminated from the net, but encrypted inside. Other application explained is the possibility of digital signature of subnets, providing security services to the net and/or subnets. My contributions to knowledge are: 1. Comprehensive study of subnets, abstracting their internal structure from the exterior by using front-ends. A method to build these subnets from the complete Petri net is explained and analyzed matrixed. 2. PNML has no way to represent subnets, so I approach a possible PNML extension to do it. 3. Subnetting and PNML extension to represents subnets allow to apply several security technics that offers encryption, data integrity, authentication and non repudiation.