A model for specification and validation of security policies in communication networks: the firewall case

被引:0
|
作者
Abassi, Ryma [1 ]
El Fatrni, Sihem Guerriara [1 ]
机构
[1] Univ November 7 Carthage, CN&S Res Lab, Carthage, Tunisia
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A security policy constitutes one of the major actors in the protection of communication networks. For this, and in order to manage the access grants in accordance with the security constraints, a security policy has to be validated before its deployment. Unfortunately, in the literature, there is no well established validation mechanisms ensuring the well founded of such security policies. This paper proposes a validation framework for security policies where: (1) executable specifications are used to build an 'Executable Security Policy, (2) a validation model is proposed to support the validation activity, and (3) a validation of the executable security policy is performed The main contributions provided by this paper concerns the adaptation of some concepts and mechanisms traditionally used in software engineering for validation aims, such as specification, executable specification or reachability graph. All the definitions made in this paper have been proposed in accordance with the firewall case.
引用
收藏
页码:467 / +
页数:2
相关论文
共 50 条
  • [1] An Automated Validation Method for Security Policies: the firewall case
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    [J]. FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 291 - 294
  • [2] Formal Specification and Validation of Security Policies
    Bourdier, Tony
    Cirstea, Horatiu
    Jaume, Mathieu
    Kirchner, Helene
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 148 - +
  • [3] Towards an Automated Firewall Security Policies Validation Process
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    [J]. CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS, 2008, : 267 - 272
  • [4] Localizing Firewall Security Policies
    Adao, Pedro
    Focardi, Riccardo
    Guttman, Joshua D.
    Luccio, Flaminia L.
    [J]. 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016), 2016, : 194 - 209
  • [5] SPECIFICATION AND VALIDATION OF A SECURITY POLICY MODEL
    BOSWELL, A
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (02) : 63 - 68
  • [6] Dealing with Multi Security Policies in Communication Networks
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    [J]. ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 282 - 287
  • [7] Firewall security: Policies, testing and performance evaluation
    Lyu, MR
    Lau, LKY
    [J]. 24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 116 - 121
  • [8] Enforcing security policies in large scale communication networks
    Apostolopoulos, TK
    Daskalou, VC
    Katsikas, SK
    Moulinos, KD
    [J]. SEVENTEENTH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 1998, : 393 - 397
  • [9] A Novel Validation Method for Firewall Security Policy
    Abbassi, Ryma
    El Fatmi, Sihem Guemara
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 329 - 337
  • [10] Automatic Verification of Conformance of Firewall Configurations to Security Policies
    Ben Youssef, Nihel
    Bouhoula, Adel
    Jacquemard, Florent
    [J]. ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 525 - +