Security policy enforcement through refinement process

被引:0
|
作者
Stouls, Nicolas [1 ]
Potet, Marie-Laure [1 ]
机构
[1] Imag Lab Grenoble, LSR, Lab Logiciels Syst Res, Grenoble, France
关键词
security policy enforcement; refinement; TCP/IP layers;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT(1) project [9], based on the research of network testing methods from a high-level security policy.
引用
收藏
页码:216 / +
页数:3
相关论文
共 50 条
  • [1] Security network policy enforcement through a SDN framework
    Berardi, Davide
    Callegati, Franco
    Melis, Andrea
    Prandini, Marco
    [J]. 2018 28TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2018, : 97 - 100
  • [2] Security policy refinement and enforcement for the design of multi-level secure systems
    Zhou, Jie
    Alves-Foss, Jim
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (02) : 107 - 131
  • [3] Network security policy refinement process: Expression and analysis
    Laborde, Romain
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (03) : 247 - 260
  • [4] Implementation of a formal security policy refinement process in WBEM architecture
    Laborde, Romain
    Kamel, Michel
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (02) : 241 - 266
  • [5] Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
    Romain Laborde
    Michel Kamel
    François Barrère
    Abdelmalek Benzekri
    [J]. Journal of Network and Systems Management, 2007, 15 : 241 - 266
  • [6] Idea: Action Refinement for Security Properties Enforcement
    Martinelli, Fabio
    Matteucci, Ilaria
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, PROCEEDINGS, 2009, 5429 : 37 - +
  • [7] A flexible architecture for security policy enforcement
    McDaniel, P
    Prakash, A
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 234 - 239
  • [8] Patterns in security enforcement policy development
    Thomsen, Dan
    [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 744 - 748
  • [9] Walls of security and policy enforcement in Belfast
    Ballif, Florine
    [J]. MEMOIRES IDENTITES MARGINALITES DANS LE MONDE OCCIDENTAL CONTEMPORAIN, 2009, 5
  • [10] Dynamic Security Policy Enforcement on Android
    Vanco, Matus
    Aron, Lukas
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 141 - 148