A model for specification and validation of security policies in communication networks: the firewall case

被引:0
|
作者
Abassi, Ryma [1 ]
El Fatrni, Sihem Guerriara [1 ]
机构
[1] Univ November 7 Carthage, CN&S Res Lab, Carthage, Tunisia
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A security policy constitutes one of the major actors in the protection of communication networks. For this, and in order to manage the access grants in accordance with the security constraints, a security policy has to be validated before its deployment. Unfortunately, in the literature, there is no well established validation mechanisms ensuring the well founded of such security policies. This paper proposes a validation framework for security policies where: (1) executable specifications are used to build an 'Executable Security Policy, (2) a validation model is proposed to support the validation activity, and (3) a validation of the executable security policy is performed The main contributions provided by this paper concerns the adaptation of some concepts and mechanisms traditionally used in software engineering for validation aims, such as specification, executable specification or reachability graph. All the definitions made in this paper have been proposed in accordance with the firewall case.
引用
收藏
页码:467 / +
页数:2
相关论文
共 50 条
  • [41] XFPM-RBAC: XML-based specification language for security policies in multidomain mobile networks
    Unal, Devrim
    Caglayan, M. Ufuk
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1420 - 1444
  • [42] Semantic Security: Specification and Enforcement of Semantic Policies for Security-driven Collaborations
    Sinnott, R. O.
    Doherty, T.
    Gray, N.
    Lusted, J.
    [J]. HEALTHGRID RESEARCH, INNOVATION AND BUSINESS CASE, 2009, 147 : 201 - +
  • [43] Formal specification and validation of a vital communication protocol
    Cimatti, A
    Pieraccini, PL
    Sebastiani, R
    Traverso, P
    Villafiorita, A
    [J]. FM'99-FORMAL METHODS, VOL II, 1999, 1709 : 1584 - 1604
  • [44] Communication Policies in Knowledge Networks
    Ioannidis, Evangelos
    Varsakelis, Nikos
    Antoniou, Ioannis
    [J]. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2018, 492 : 360 - 374
  • [45] A CM-based model for 802.11 networks security policies enforcement
    Mabiala Dondia, Karl
    Ma, Jing
    Feng Tao
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 1610 - 1617
  • [46] Formal specification and management of security policies with collective group obligations
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Elrakaiby, Yehia
    [J]. JOURNAL OF COMPUTER SECURITY, 2013, 21 (01) : 149 - 190
  • [47] Specification and Verification of Security in Reconfigurable Scan Networks
    Kochte, Michael A.
    Sauer, Matthias
    Gomez, Laura Rodriguez
    Raiola, Pascal
    Becker, Bernd
    Wunderlich, Hans-Joachim
    [J]. 2017 22ND IEEE EUROPEAN TEST SYMPOSIUM (ETS), 2017,
  • [48] Specification modeling and validation applied to network security gateways
    Hall, RJ
    [J]. FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 289 - 289
  • [49] S-Promela: An Executable Specification Security Policies Language
    Abbassi, Ryma
    El Fatmi, Sihem Guemara
    [J]. 2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING (COMNET 2009), 2009, : 72 - 79
  • [50] On the specification, validation and verification of security in access control systems
    [J]. O'Shea, Greg, 1600, Oxford Univ Press, Oxford, United Kingdom (37):