A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model

نویسندگان

  • Padmalochan Bera
  • Soumya Maity
  • Soumya K. Ghosh
  • Pallab Dasgupta
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cluster Based Anomaly Detection in Wireless LAN

Data mining methods have gained importance in addressing computer network security. Existing Rule based classification models for anomaly detection are ineffective in dealing with dynamic changes in intrusion patterns and characteristic. Unsupervised learning methods have been given a closer look for network anomaly detection. We investigate hierarchical clustering algorithm for anomaly detecti...

متن کامل

Using Spatio-Temporal Role Based Access Control for Physical Access Control Specification: Towards Effective Cyber-Physical Systems

Spatio-Temporal Role-based access control (STRBAC) has been acknowledged as an effective mechanism for specifying access control policies for cyber systems. However, it is not yet clear how a STRBAC model can be used for specifying access control policies for physical systems. In this paper, we propose a Spatio-Temporal Role Based Access Control (STRBAC) system for modeling the physical access ...

متن کامل

A framework for policy-based sla management over wireless lan

With the evolution of wireless networks, the wireless community has been increasingly looking for a framework that can provide policy-based SLA management. In this paper we first construct such a framework and then describe how SLA-based control can be used to achieve QoS in wireless environment. We provide a common generic framework capable of components to interwork via XML. The proposed fram...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

Management and Verification of Firewall and Router Access Lists

Security in computer networks is a very complex task especially if it is required to separate a corporate network from public Internet or to divide a company’s intranet into multiple zones with different security requirements. The network security policy that describes these security requirements is primarily presented in a high-level form. Also, the security policy is enforced using some low-l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010