{"title":"网络安全的正式框架(表达式+分析)","authors":"R. Laborde, F. Barrère, A. Benzekri","doi":"10.1109/NCA.2005.2","DOIUrl":null,"url":null,"abstract":"Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependences of the devices to consider. We propose in this article a formal framework, which models the network security management information in order to verify the appliance of security goals. The framework is divided into two components. First, a formal language allows its user to graphically specify the abstract network security tactics while considering network topologies. Second, an associated evaluation method guarantees the consistency and the correctness of the tactics according to the security goals","PeriodicalId":188815,"journal":{"name":"Fourth IEEE International Symposium on Network Computing and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A formal framework (Expression + Analysis) for network security\",\"authors\":\"R. Laborde, F. Barrère, A. Benzekri\",\"doi\":\"10.1109/NCA.2005.2\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependences of the devices to consider. We propose in this article a formal framework, which models the network security management information in order to verify the appliance of security goals. The framework is divided into two components. First, a formal language allows its user to graphically specify the abstract network security tactics while considering network topologies. Second, an associated evaluation method guarantees the consistency and the correctness of the tactics according to the security goals\",\"PeriodicalId\":188815,\"journal\":{\"name\":\"Fourth IEEE International Symposium on Network Computing and Applications\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-07-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fourth IEEE International Symposium on Network Computing and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCA.2005.2\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fourth IEEE International Symposium on Network Computing and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCA.2005.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A formal framework (Expression + Analysis) for network security
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependences of the devices to consider. We propose in this article a formal framework, which models the network security management information in order to verify the appliance of security goals. The framework is divided into two components. First, a formal language allows its user to graphically specify the abstract network security tactics while considering network topologies. Second, an associated evaluation method guarantees the consistency and the correctness of the tactics according to the security goals