A formal framework (Expression plus Analysis) for network security mechanisms configuration

被引:0
|
作者
Laborde, R [1 ]
Barrère, F [1 ]
Benzekri, A [1 ]
机构
[1] Univ Toulouse 3, IRIT, SIERA, F-31062 Toulouse, France
来源
Fourth IEEE International Symposium on Network Computing and Applications, Proceedings | 2005年
关键词
D O I
10.1109/NCA.2005.2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependencies of the devices to consider. We propose in this article a formal framework which models the network security management information in order to verify the appliance of security goals. The framework is divided into two components. First, a formal language allows its user to graphically specify the abstract network security tactics while considering network topologies. Second, an associated evaluation method guarantees the consistency and the correctness of the tactics according to the security goals.
引用
收藏
页码:223 / 226
页数:4
相关论文
共 50 条
  • [1] Formal integrated network security analysis tool: formal query-based network security configuration analysis
    Maity, Soumya
    Bera, P.
    Ghosh, Soumya K.
    Al-Shaer, Ehab
    IET NETWORKS, 2015, 4 (02) : 137 - 147
  • [2] Network Security : Formal and Optimized Configuration
    Fall, Marfall N.
    Mejri, Mohamed
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2010, 217 : 229 - 246
  • [3] Integrated security analysis framework for an enterprise network - a formal approach
    Bera, P.
    Ghosh, S. K.
    Dasgupta, P.
    IET INFORMATION SECURITY, 2010, 4 (04) : 283 - 300
  • [4] A Framework for Formal Verification of Security Protocols in C plus
    Pradeep, R.
    Sunitha, N. R.
    Ravi, V
    Verma, Sushma
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 163 - 175
  • [5] A Formal Framework for Network Security Design Synthesis
    Rahman, Mohammad Ashiqur
    Al-Shaer, Ehab
    2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2013, : 560 - 570
  • [6] Formal analysis methods of network security design
    Stawowski, Mariusz
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 313 - 318
  • [7] Configuration Tool for a Wireless Sensor Network Integrated Security Framework
    Victor Cionca
    Thomas Newe
    Vasile Teodor Dădârlat
    Journal of Network and Systems Management, 2012, 20 : 417 - 452
  • [8] Configuration Tool for a Wireless Sensor Network Integrated Security Framework
    Cionca, Victor
    Newe, Thomas
    Dadarlat, Vasile Teodor
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2012, 20 (03) : 417 - 452
  • [9] Government network and information security - MCDM framework for the selection of security mechanisms
    Chemane, Lourino A.
    Ekenberg, Love
    Popov, Oliver
    Carrilho, Sergio
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 201 - 207
  • [10] A formal framework for provenance security
    Cheney, James
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 281 - 293