Speciication and Validation of a Network Security Policy Model Speciication and Validation of a Network Security Policy Model
نویسنده
چکیده
This case study concerns the speciication and validation of a Security Policy Model (SPM) for an electronic network. The network is intended to provide processing and transmission services for electronic messages, including sensitive and classiied material, over distributed sites and supporting multiple levels of security classiication. The SPM is formally speciied in VDM-SL and validated by showing that the model is mathematically consistent and satisses certain security properties. Rigorous proofs are provided. In addition, the case study illustrates some new techniques concerning proof obligations for exception conditions in VDM-SL.
منابع مشابه
Stakeholders\' network in Iranian health policy-making: A model for participatory policy-making
Background: Stewardship, resource generation, financing, and providing services are the 4 main functions in any health system. Using intelligence and common sense in making policies and decisions is a subcomponent of the stewardship. The present study aimed at designing a model that provides better access to the stakeholders’ wisdom. Methods: This was a qualitative study in ...
متن کاملA Mandatory Access Control Policy Model for Information Security Requirements
Two basic paradigms towards speciication of information security requirements can be taken: continuous speciication and early speciication of requirements. In models supporting continuous specii-cation and reenement of information security requirements, the development organization is more vulnerable to the tampering with partially speciied requirement primitives. This paper proposes a formal m...
متن کاملحاکمیت شبکهای در نهادهای پژوهشی امنیت سایبری
Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملA model with policy network approach for entrepreneurship policy making
One policy making issue that needs to be addressed more effectively through an intergovernmental and participatory approach is entrepreneurship policy. Entrepreneurship is an area where interdependencies are very high, and the establishment of collaborative relationships such as networks is vital. Therefore, a network approach in the entrepreneurial policy-making process, which leads to the inv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997