Security Policy Enforcement Through Refinement Process

نویسندگان

  • Nicolas Stouls
  • Marie-Laure Potet
چکیده

In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project [9], based on the research of network testing methods from a high-level security policy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Policy-Based Security for Wireless Components in High Assurance Computer Systems

To enable the growth of wireless networks in high assurance computer systems, it is essential to establish a security engineering methodology that provides system security managers with a procedural engineering process to develop computer security policies. Our research demonstrates how wireless communication technology is deployed using the Multiple Independent Levels of Security (MILS) archit...

متن کامل

Layered multipoint network defense and security policy enforcement

This paper discusses the enhancement of security in general purpose operating systems, especially related to threats caused by internetworking, using extensions to operating systems. Such mechanisms have a significantly larger basis for reaching security policy decisions than older host-level security mechanisms and firewalls. By layering defensive mechanisms yet enforcing a consistent security...

متن کامل

Preservation of Policy Adherence under Refinement

Policy-basedmanagement is an approach to the management of sys-tems with respect to issues such as security, access control and trustby the enforcement of policy rules. This paper addresses the problemof integrating the requirements imposed by a policy with the systemdevelopment process. In order to take a policy specification into ac-count in the development of a system spe...

متن کامل

The dynamic adaptation of security policies in pervasive environments, with contextual information as the catalyst

The concept of exploiting context information to produce dynamically adapting, accurate and timely security policies for pervasive environments and the entities of these environments are discussed briefly in this paper. The challenges relating to the effective establishment and enforcement of security policies in unpredictable pervasive environments are outlines, along with issues faced in the ...

متن کامل

Adaptive identity and access management - contextual data based policies

Due to compliance and IT security requirements, company-wide identity and access management within organizations has gained significant importance in research and practice over the last years. Companies aim at standardizing user management policies in order to reduce administrative overhead and strengthen IT security. These policies provide the foundation for every identity and access managemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007