Assessment of Network Security Policy Based on Security Capability

被引:0
|
作者
Tang, Chenghua [1 ]
Yu, Shunzheng [1 ]
机构
[1] Zhongshan Sun Yat Sen Univ, Dept Elect & Commun Engn, Guangzhou, Guangdong, Peoples R China
关键词
network security; security policy; security capability; validity;
D O I
10.1109/ICCS.2008.4737373
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The validity of the security policy has important impacts on the safety performance of network information system. For purpose of verifying it effectively, an assessment model of network security policy based on security capability is proposed. The relationship of defense methods, application targets, and information security attribute characteristics is analyzed based on the establishing of security domain and security policy, and the network security capability of security policy is evaluated. Result shows that the model can effectively reflect the protect ability of security policy. It provides a new solution and reference for assessing and adjusting the network security policy, so as to better ensure system security.
引用
收藏
页码:1204 / 1208
页数:5
相关论文
共 50 条
  • [1] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [2] An Automata-based Security Policy Translation for Network Security Functions
    Yang, Jinhyuk
    Jeong, Jaehoon
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 268 - 272
  • [3] SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services
    Lingga, Patrick
    Jeong, Jaehoon
    Yang, Jinhyuk
    Kim, Jeonghyeon
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5156 - 5169
  • [4] Security policy of network messages based on SOAP
    Zhang, Gong-Xuan
    Song, Bin
    Wang, Ping-Li
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (01): : 66 - 70
  • [5] Design of a LDAP schema based on network security policy information model for storing security policy
    Kim, G
    Na, JC
    Sohn, S
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 373 - 377
  • [6] Security policy decision for automation of security network configuration
    Ahn, G
    Yoon, SY
    Kim, KY
    Jang, JS
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1057 - 1061
  • [8] Access Control Capability Assessment Method Based on Security Entropy
    Che, Tianwei
    Ma, Jianfeng
    Li, Na
    Wang, Chao
    JOURNAL OF COMPUTERS, 2014, 9 (12) : 2804 - 2808
  • [9] Alert analysis using data mining for security policy server in policy based network security management
    Jeong, KJ
    Shin, MS
    Moon, HS
    Ryu, KH
    Kim, KY
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 219 - 225
  • [10] SECURITY RISKS ASSESSMENT AND SECURITY POLICY IN THE REPUBLIC OF MACEDONIA
    Gerasimoski, Sase
    Nikolovski, Marjan
    Gjurovski, Marjan
    CRIMINAL JUSTICE AND SECURITY IN CENTRAL AND EASTERN EUROPE: FROM COMMON SENSE TO EVIDENCE-BASED POLICY-MAKING, 2018, : 283 - 294