Implementation of a formal security policy refinement process in WBEM architecture

被引:7
|
作者
Laborde, Romain
Kamel, Michel
Barrere, Francois
Benzekri, Abdelmalek
机构
[1] Univ Toulouse 3, IRIT SIERA, F-31062 Toulouse 04, France
[2] Univ Kent, Comp Lab, Canterbury CT2 7NZ, Kent, England
关键词
security policy; network security; security management; WBEM (web-based enterprise management);
D O I
10.1007/s10922-007-9063-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependencies of the devices to consider. In previous papers, we have proposed a formal framework that focuses on network security information management refinement. The framework includes three abstraction levels: the network security objectives, the network security tactics, and the network security device configurations. The information models of each abstraction level (consistency, correctness and feasibility) are formally specified and analyzed. In this paper we present the integration of this formal refinement process in the WBEM initiative in order to provide a management infrastructure that guarantees the validity of the deployed security configurations.
引用
收藏
页码:241 / 266
页数:26
相关论文
共 50 条
  • [1] Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
    Romain Laborde
    Michel Kamel
    François Barrère
    Abdelmalek Benzekri
    [J]. Journal of Network and Systems Management, 2007, 15 : 241 - 266
  • [2] Security policy enforcement through refinement process
    Stouls, Nicolas
    Potet, Marie-Laure
    [J]. B 2007: FORMAL SPECIFICATION AND DEVELOPMENT IN B, PROCEEDINGS, 2007, 4355 : 216 - +
  • [3] Formal validation of automated policy refinement in the management of network security systems
    de Albuquerque, Joao Porto
    Krumm, Heiko
    de Geus, Paulo Licio
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (02) : 99 - 125
  • [4] Formal validation of automated policy refinement in the management of network security systems
    João Porto de Albuquerque
    Heiko Krumm
    Paulo Lício de Geus
    [J]. International Journal of Information Security, 2010, 9 : 99 - 125
  • [5] Network security policy refinement process: Expression and analysis
    Laborde, Romain
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (03) : 247 - 260
  • [6] The new topicality of using Formal Models of Security Policy within the security engineering process
    Koob, F
    Ullmann, M
    Wittmann, S
    [J]. APPLIED FORMAL METHODS - FM-TRENDS 98, 1999, 1641 : 302 - 310
  • [7] A Formal Implementation of Database Security
    Bai, Yun
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 90 - 92
  • [8] Formal Specification, Refinement, and Implementation of Path Planning
    Rabiah, Eman
    Belkhouche, Boumediene
    [J]. PROCEEDINGS OF THE 2016 12TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2016, : 1 - 6
  • [9] Security Policy Refinement: High-Level Specification to Low-Level Implementation
    Yang, Xia
    Alves-Foss, Jim
    [J]. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 502 - 511
  • [10] Using Refinement in Formal Development of OS Security Model
    Devyanin, Petr N.
    Khoroshilov, Alexey V.
    Kuliamin, Victor V.
    Petrenko, Alexander K.
    Shchepetkov, Ilya V.
    [J]. PERSPECTIVES OF SYSTEM INFORMATICS, PSI 2015, 2016, 9609 : 107 - 115