Reliable process for security policy deployment

被引:0
|
作者
Preda, Stere [1 ]
Cuppens-Boulahia, Nora [1 ]
Cuppens, Frederic [1 ]
Alfaro, Joaquin G. [1 ,2 ]
Toutain, Laurent [1 ]
机构
[1] ENST Bretagne, GET, 2 Rue Chataigneraie, F-35512 Cesson Sevigne, France
[2] Univ Oberta Catalunya, Barcelona 08018, Spain
关键词
network security; security devices; security rules; deployment of policies; policy anomalies;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We focus in this paper on the problem of configuring and managing network security devices, such as Fire-walls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security.
引用
收藏
页码:5 / +
页数:2
相关论文
共 50 条
  • [1] Policy deployment: modelling the CRISP process
    Lee, RG
    Dale, BG
    [J]. PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART B-JOURNAL OF ENGINEERING MANUFACTURE, 2000, 214 (07) : 603 - 610
  • [2] Reliable Security Policy in Mobile Distributed Network
    Suganthi, Bhuvana D.
    Manjuath, R.
    Aravindan, A.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1782 - 1786
  • [3] SECURITY POLICY AND PROCESS OF DETENTE
    BAUDISSIN, WGV
    [J]. COEXISTENCE, 1977, 14 (01) : 100 - 116
  • [4] Research on Information Security Policy's Deployment for Smart Grid
    Ma, Yonghong
    Lu, Baohui
    Wei, Ning
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 52 - 54
  • [5] Semantics-Based Analysis of Content Security Policy Deployment
    Calzavara, Stefano
    Rabitti, Alvise
    Bugliesi, Michele
    [J]. ACM TRANSACTIONS ON THE WEB, 2018, 12 (02)
  • [6] A Firewall Policy Anomaly Detection Framework for Reliable Network Security
    Togay, Cengiz
    Kasif, Ahmet
    Catal, Cagatay
    Tekinerdogan, Bedir
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (01) : 339 - 347
  • [7] A Security Risk Assessment Model for Business Process Deployment in the Cloud
    Goettelmann, Elio
    Dahman, Karim
    Gateau, Benjamin
    Dubois, Eric
    Godart, Claude
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 307 - 314
  • [8] A Model-Based Framework for Security Policy Specification, Deployment and Testing
    Mouelhi, Tejeddine
    Fleurey, Franck
    Baudry, Benoit
    Le Traon, Yves
    [J]. MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2008, 5301 : 537 - 552
  • [9] Model-Driven Security Policy Deployment: Property Oriented Approach
    Preda, Stere
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Garcia-Alfaro, Joaquin
    Toutain, Laurent
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2010, 5965 : 123 - 139
  • [10] The Security Policy Application Process: Action Research
    Lopes, Isabel
    Oliveira, Pedro
    [J]. NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2016, 445 : 353 - 362