Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation
In this thesis I approach the study of Petri nets from the point of view of the security. There several goals in this thesis. First of all, I will define a subnetting process by building a framework of definitions and notations to create subnets from the original Petri net. Then, the creation of a P...
Guardado en:
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | text (thesis) |
Lenguaje: | eng |
Publicado: |
Universidad de La Rioja (España)
2015
|
Acceso en línea: | https://dialnet.unirioja.es/servlet/oaites?codigo=46782 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai-TES0000009207 |
---|---|
record_format |
dspace |
spelling |
oai-TES00000092072019-07-21Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiationLeón Samaniego, IñigoIn this thesis I approach the study of Petri nets from the point of view of the security. There several goals in this thesis. First of all, I will define a subnetting process by building a framework of definitions and notations to create subnets from the original Petri net. Then, the creation of a PNML extension that allows the representation of subnets. In this work only the structure of the network is processed. The study of markings and properties of nets with hidden pieces will we analyzed in further works. One application of this subnetting and PNML representation is the possibility of hiding part of a Petri net, facing a possible distribution, maintaining the privacy of the critical, secret, or complex parts of the system. However this hidden information is not eliminated from the net, but encrypted inside. Other application explained is the possibility of digital signature of subnets, providing security services to the net and/or subnets. My original contribution to knowledge are: 1. Comprehensive study of subnets, abstracting their internal structure from the exterior by using front-ends. A method to build these subnets from the complete Petri net is explained and analyzed matrixed. 2. PNML has no way to represent subnets, so I approach a possible PNML extension to do it. 3. Subnetting and PNML extension to represents subnets allow to apply several security technics that offers encryption, data integrity, authentication and non repudiationUniversidad de La Rioja (España)Jiménez Macías, Emilio (Universidad de La Rioja)Latorre Biel, J. I. (Universidad de La Rioja)2015text (thesis)application/pdfhttps://dialnet.unirioja.es/servlet/oaites?codigo=46782engLICENCIA DE USO: Los documentos a texto completo incluidos en Dialnet son de acceso libre y propiedad de sus autores y/o editores. Por tanto, cualquier acto de reproducción, distribución, comunicación pública y/o transformación total o parcial requiere el consentimiento expreso y escrito de aquéllos. Cualquier enlace al texto completo de estos documentos deberá hacerse a través de la URL oficial de éstos en Dialnet. Más información: https://dialnet.unirioja.es/info/derechosOAI | INTELLECTUAL PROPERTY RIGHTS STATEMENT: Full text documents hosted by Dialnet are protected by copyright and/or related rights. This digital object is accessible without charge, but its use is subject to the licensing conditions set by its authors or editors. Unless expressly stated otherwise in the licensing conditions, you are free to linking, browsing, printing and making a copy for your own personal purposes. All other acts of reproduction and communication to the public are subject to the licensing conditions expressed by editors and authors and require consent from them. Any link to this document should be made using its official URL in Dialnet. More info: https://dialnet.unirioja.es/info/derechosOAI |
institution |
DialNet |
collection |
DialNet |
language |
eng |
description |
In this thesis I approach the study of Petri nets from the point of view of the security. There several goals in this thesis. First of all, I will define a subnetting process by building a framework of definitions and notations to create subnets from the original Petri net. Then, the creation of a PNML extension that allows the representation of subnets. In this work only the structure of the network is processed. The study of markings and properties of nets with hidden pieces will we analyzed in further works.
One application of this subnetting and PNML representation is the possibility of hiding part of a Petri net, facing a possible distribution, maintaining the privacy of the critical, secret, or complex parts of the system. However this hidden information is not eliminated from the net, but encrypted inside. Other application explained is the possibility of digital signature of subnets, providing security services to the net and/or subnets.
My original contribution to knowledge are:
1. Comprehensive study of subnets, abstracting their internal structure from the exterior by using front-ends. A method to build these subnets from the complete Petri net is explained and analyzed matrixed.
2. PNML has no way to represent subnets, so I approach a possible PNML extension to do it.
3. Subnetting and PNML extension to represents subnets allow to apply several security technics that offers encryption, data integrity, authentication and non repudiation |
author2 |
Jiménez Macías, Emilio (Universidad de La Rioja) |
author_facet |
Jiménez Macías, Emilio (Universidad de La Rioja) León Samaniego, Iñigo |
format |
text (thesis) |
author |
León Samaniego, Iñigo |
spellingShingle |
León Samaniego, Iñigo Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation |
author_sort |
León Samaniego, Iñigo |
title |
Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation |
title_short |
Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation |
title_full |
Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation |
title_fullStr |
Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation |
title_full_unstemmed |
Security in Petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation |
title_sort |
security in petri nets sharing and storage: subnets, privacy, integrity, authentication and non repudiation |
publisher |
Universidad de La Rioja (España) |
publishDate |
2015 |
url |
https://dialnet.unirioja.es/servlet/oaites?codigo=46782 |
work_keys_str_mv |
AT leonsamaniegoinigo securityinpetrinetssharingandstoragesubnetsprivacyintegrityauthenticationandnonrepudiation |
_version_ |
1718346640421552128 |