{"title":"A formal framework (Expression + Analysis) for network security","authors":"R. Laborde, F. Barrère, A. Benzekri","doi":"10.1109/NCA.2005.2","DOIUrl":null,"url":null,"abstract":"Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependences of the devices to consider. We propose in this article a formal framework, which models the network security management information in order to verify the appliance of security goals. The framework is divided into two components. First, a formal language allows its user to graphically specify the abstract network security tactics while considering network topologies. Second, an associated evaluation method guarantees the consistency and the correctness of the tactics according to the security goals","PeriodicalId":188815,"journal":{"name":"Fourth IEEE International Symposium on Network Computing and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fourth IEEE International Symposium on Network Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2005.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependences of the devices to consider. We propose in this article a formal framework, which models the network security management information in order to verify the appliance of security goals. The framework is divided into two components. First, a formal language allows its user to graphically specify the abstract network security tactics while considering network topologies. Second, an associated evaluation method guarantees the consistency and the correctness of the tactics according to the security goals