Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation

In this thesis I approach the study of Petri nets from the point of view of the security. There several goals in this thesis. First of all, I will define a subnetting process by building a framework of definitions and notations to create subnets from the original Petri net. Then, the creation of a P...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autor principal: León Samaniego, Iñigo
Otros Autores: Jiménez Macías, Emilio (Universidad de La Rioja)
Formato: text (thesis)
Lenguaje:eng
Publicado: Universidad de La Rioja (España) 2015
Acceso en línea:https://dialnet.unirioja.es/servlet/oaites?codigo=46782
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai-TES0000009207
record_format dspace
spelling oai-TES00000092072019-07-21Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiationLeón Samaniego, IñigoIn this thesis I approach the study of Petri nets from the point of view of the security. There several goals in this thesis. First of all, I will define a subnetting process by building a framework of definitions and notations to create subnets from the original Petri net. Then, the creation of a PNML extension that allows the representation of subnets. In this work only the structure of the network is processed. The study of markings and properties of nets with hidden pieces will we analyzed in further works. One application of this subnetting and PNML representation is the possibility of hiding part of a Petri net, facing a possible distribution, maintaining the privacy of the critical, secret, or complex parts of the system. However this hidden information is not eliminated from the net, but encrypted inside. Other application explained is the possibility of digital signature of subnets, providing security services to the net and/or subnets. My original contribution to knowledge are: 1. Comprehensive study of subnets, abstracting their internal structure from the exterior by using front-ends. A method to build these subnets from the complete Petri net is explained and analyzed matrixed. 2. PNML has no way to represent subnets, so I approach a possible PNML extension to do it. 3. Subnetting and PNML extension to represents subnets allow to apply several security technics that offers encryption, data integrity, authentication and non repudiationUniversidad de La Rioja (España)Jiménez Macías, Emilio (Universidad de La Rioja)Latorre Biel, J. I. (Universidad de La Rioja)2015text (thesis)application/pdfhttps://dialnet.unirioja.es/servlet/oaites?codigo=46782engLICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI
institution DialNet
collection DialNet
language eng
description In this thesis I approach the study of Petri nets from the point of view of the security. There several goals in this thesis. First of all, I will define a subnetting process by building a framework of definitions and notations to create subnets from the original Petri net. Then, the creation of a PNML extension that allows the representation of subnets. In this work only the structure of the network is processed. The study of markings and properties of nets with hidden pieces will we analyzed in further works. One application of this subnetting and PNML representation is the possibility of hiding part of a Petri net, facing a possible distribution, maintaining the privacy of the critical, secret, or complex parts of the system. However this hidden information is not eliminated from the net, but encrypted inside. Other application explained is the possibility of digital signature of subnets, providing security services to the net and/or subnets. My original contribution to knowledge are: 1. Comprehensive study of subnets, abstracting their internal structure from the exterior by using front-ends. A method to build these subnets from the complete Petri net is explained and analyzed matrixed. 2. PNML has no way to represent subnets, so I approach a possible PNML extension to do it. 3. Subnetting and PNML extension to represents subnets allow to apply several security technics that offers encryption, data integrity, authentication and non repudiation
author2 Jiménez Macías, Emilio (Universidad de La Rioja)
author_facet Jiménez Macías, Emilio (Universidad de La Rioja)
León Samaniego, Iñigo
format text (thesis)
author León Samaniego, Iñigo
spellingShingle León Samaniego, Iñigo
Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
author_sort León Samaniego, Iñigo
title Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
title_short Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
title_full Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
title_fullStr Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
title_full_unstemmed Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
title_sort security in petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
publisher Universidad de La Rioja (España)
publishDate 2015
url https://dialnet.unirioja.es/servlet/oaites?codigo=46782
work_keys_str_mv AT leonsamaniegoinigo securityinpetrinetssharingandstoragesubnetsprivacyintegrityauthenticationandnonrepudiation
_version_ 1718346640421552128