Network security policy refinement process: Expression and analysis

被引:0
|
作者
Laborde, Romain
Barrere, Francois
Benzekri, Abdelmalek
机构
[1] Univ Toulouse 3, IRIT, SIERA, F-31062 Toulouse 04, France
[2] Univ Kent, Comp Lab, Canterbury CT2 7NZ, Kent, England
关键词
network security management; security policy refinement; formal specification; WBEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, users need to access their granted services from anywhere and at any time. Network security management must evolve to satisfy these requirements. The policy based network management approach proposes to separate the rules that govern the system from the functionalities provided by it. Nevertheless, the policy rules should be consistent, correct against the objectives and enforceable onto the devices. This problem becomes complex considering the dependencies of the rules - each rule on a device can impact another rule on another device - and each device needs specific configuration according to the technologies implemented. This article presents a formal framework for the refinement of network security management information. It includes three abstraction levels: the network security objectives, the network security tactics and the network security devices configurations. The information models of each abstraction level are formally specified and analysed (consistency, correctness and feasibility). A WBEM implementation of the formal refinement framework proves its feasibility in management architectures.
引用
收藏
页码:247 / 260
页数:14
相关论文
共 50 条
  • [1] Security policy enforcement through refinement process
    Stouls, Nicolas
    Potet, Marie-Laure
    [J]. B 2007: FORMAL SPECIFICATION AND DEVELOPMENT IN B, PROCEEDINGS, 2007, 4355 : 216 - +
  • [2] Policy modeling and refinement for network security systems
    de Albuquerque, JP
    Krumm, H
    de Geus, PL
    [J]. SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 24 - 33
  • [3] Implementation of a formal security policy refinement process in WBEM architecture
    Laborde, Romain
    Kamel, Michel
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (02) : 241 - 266
  • [4] Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
    Romain Laborde
    Michel Kamel
    François Barrère
    Abdelmalek Benzekri
    [J]. Journal of Network and Systems Management, 2007, 15 : 241 - 266
  • [5] Formal validation of automated policy refinement in the management of network security systems
    de Albuquerque, Joao Porto
    Krumm, Heiko
    de Geus, Paulo Licio
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 9 (02) : 99 - 125
  • [6] Formal validation of automated policy refinement in the management of network security systems
    João Porto de Albuquerque
    Heiko Krumm
    Paulo Lício de Geus
    [J]. International Journal of Information Security, 2010, 9 : 99 - 125
  • [7] Efficient Network Security Policy Enforcement With Policy Space Analysis
    Wang, Xiang
    Shi, Weiqi
    Xiang, Yang
    Li, Jun
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 2958 - 2970
  • [8] Content, context, process analysis of is security policy formation
    Karyda, M
    Kokolakis, S
    Kiountouzis, E
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 145 - 156
  • [9] Analysis of policy anomalies on distributed network security setups
    Alfaro, J. G.
    Cuppens, F.
    Cuppens-Boulahia, N.
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 496 - 511
  • [10] Action refinement in process algebra and security issues
    Bossi, Annalisa
    Piazza, Carla
    Rossi, Sabina
    [J]. LOGIC-BASED PROGRAM SYNTHESIS AND TRANSFORMATION, 2008, 4915 : 201 - 217