Security Policy Enforcement Through Refinement Process
نویسندگان
چکیده
In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project [9], based on the research of network testing methods from a high-level security policy.
منابع مشابه
Policy-Based Security for Wireless Components in High Assurance Computer Systems
To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) archit...
متن کاملLayered multipoint network defense and security policy enforcement
This paper discusses the enhancement of security in general purpose operating systems, especially related to threats caused by internetworking, using extensions to operating systems. Such mechanisms have a significantly larger basis for reaching security policy decisions than older host-level security mechanisms and firewalls. By layering defensive mechanisms yet enforcing a consistent security...
متن کاملPreservation of Policy Adherence under Refinement
Policy-basedmanagement is an approach to the management of sys-tems with respect to issues such as security, access control and trustby the enforcement of policy rules. This paper addresses the problemof integrating the requirements imposed by a policy with the systemdevelopment process. In order to take a policy specification into ac-count in the development of a system spe...
متن کاملThe dynamic adaptation of security policies in pervasive environments, with contextual information as the catalyst
The concept of exploiting context information to produce dynamically adapting, accurate and timely security policies for pervasive environments and the entities of these environments are discussed briefly in this paper. The challenges relating to the effective establishment and enforcement of security policies in unpredictable pervasive environments are outlines, along with issues faced in the ...
متن کاملAdaptive identity and access management - contextual data based policies
Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at standardizing user management policies in order to reduce administrative overhead and strengthen IT security. These policies provide the foundation for every identity and access managemen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007