Security Policy Enforcement Through Refinement Process

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Scientific paper

In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project, based on the research of network testing methods from a high-level security policy.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Security Policy Enforcement Through Refinement Process does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Security Policy Enforcement Through Refinement Process, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security Policy Enforcement Through Refinement Process will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-220574

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.