Speciication and Validation of a Network Security Policy Model Speciication and Validation of a Network Security Policy Model

نویسنده

  • Peter A. Lindsay
چکیده

This case study concerns the speciication and validation of a Security Policy Model (SPM) for an electronic network. The network is intended to provide processing and transmission services for electronic messages, including sensitive and classiied material, over distributed sites and supporting multiple levels of security classiication. The SPM is formally speciied in VDM-SL and validated by showing that the model is mathematically consistent and satisses certain security properties. Rigorous proofs are provided. In addition, the case study illustrates some new techniques concerning proof obligations for exception conditions in VDM-SL.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stakeholders\' network in Iranian health policy-making: A model for participatory policy-making

Background: Stewardship, resource generation, financing, and providing services are the 4 main functions in any health system. Using intelligence and common sense in making policies and decisions is a subcomponent of the stewardship. The present study aimed at designing a model that provides better access to the stakeholders’ wisdom.    Methods: This was a qualitative study in ...

متن کامل

A Mandatory Access Control Policy Model for Information Security Requirements

Two basic paradigms towards speciication of information security requirements can be taken: continuous speciication and early speciication of requirements. In models supporting continuous specii-cation and reenement of information security requirements, the development organization is more vulnerable to the tampering with partially speciied requirement primitives. This paper proposes a formal m...

متن کامل

حاکمیت شبکه‌ای در نهادهای پژوهشی امنیت ‌سایبری

Governments change their governance style according to social, political and economic conditions. Cyber security technology is among today’s most changeable technologies, which is a critical key to the national security. Because of the weaknesses in the interaction among syber security research organizations, introducing a model for utilizing all existing capabilities can be an appro...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

A model with policy network approach for entrepreneurship policy making

One policy making issue that needs to be addressed more effectively through an intergovernmental and participatory approach is entrepreneurship policy. Entrepreneurship is an area where interdependencies are very high, and the establishment of collaborative relationships such as networks is vital. Therefore, a network approach in the entrepreneurial policy-making process, which leads to the inv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997