Network security policy refinement process: Expression and analysis

被引:0
|
作者
Laborde, Romain
Barrere, Francois
Benzekri, Abdelmalek
机构
[1] Univ Toulouse 3, IRIT, SIERA, F-31062 Toulouse 04, France
[2] Univ Kent, Comp Lab, Canterbury CT2 7NZ, Kent, England
关键词
network security management; security policy refinement; formal specification; WBEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, users need to access their granted services from anywhere and at any time. Network security management must evolve to satisfy these requirements. The policy based network management approach proposes to separate the rules that govern the system from the functionalities provided by it. Nevertheless, the policy rules should be consistent, correct against the objectives and enforceable onto the devices. This problem becomes complex considering the dependencies of the rules - each rule on a device can impact another rule on another device - and each device needs specific configuration according to the technologies implemented. This article presents a formal framework for the refinement of network security management information. It includes three abstraction levels: the network security objectives, the network security tactics and the network security devices configurations. The information models of each abstraction level are formally specified and analysed (consistency, correctness and feasibility). A WBEM implementation of the formal refinement framework proves its feasibility in management architectures.
引用
收藏
页码:247 / 260
页数:14
相关论文
共 50 条
  • [31] Security framework for home network: Authentication, authorization, and security policy
    Kim, Geon Woo
    Lee, Deok Gyu
    Han, Jong Wook
    Kim, Sang Choon
    Kim, Sang Wook
    [J]. EMERGING TECHNOLOGIES IN KNOWLEDGE DISCOVERY AND DATA MINING, 2007, 4819 : 621 - +
  • [32] Forest and water policy integration: A process and output-oriented policy network analysis
    Baulenas, Eulalia
    Kruse, Sylvia
    Sotirov, Metodi
    [J]. ENVIRONMENTAL POLICY AND GOVERNANCE, 2021, 31 (05) : 432 - 450
  • [33] Research in Analysis IT Security Policy and Security Solution
    Liao, Kai
    Li, Feng
    [J]. 2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL, ELECTRONIC AND ENGINEERING TECHNOLOGY (MEET 2019), 2019, : 180 - 184
  • [34] Beliefs and cooperation: analysis of the network of actors of the common security and defense policy of the EU
    Barrette, Patrick
    [J]. SWISS POLITICAL SCIENCE REVIEW, 2014, 20 (01) : 115 - 145
  • [35] A formal framework (Expression plus Analysis) for network security mechanisms configuration
    Laborde, R
    Barrère, F
    Benzekri, A
    [J]. Fourth IEEE International Symposium on Network Computing and Applications, Proceedings, 2005, : 223 - 226
  • [36] Process security in the network of pharmaceutical companies
    Loock, D
    [J]. PHARMAZEUTISCHE INDUSTRIE, 2004, 66 (11A): : 1387 - 1389
  • [37] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    [J]. 7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
  • [38] The Security Policy Application Process: Action Research
    Lopes, Isabel
    Oliveira, Pedro
    [J]. NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2016, 445 : 353 - 362
  • [39] The Faroe Islands' Security Policy in a Process of Devolution
    Jakupsstovu, Beinta i
    Berg, Regin
    [J]. ICELANDIC REVIEW OF POLITICS & ADMINISTRATION, 2012, 8 (02): : 413 - 430
  • [40] Managing national security policy: The president and the process
    Pfiffner, JP
    [J]. POLITICAL SCIENCE QUARTERLY, 2004, 119 (03) : 523 - 524