Automata-based approach to design and analyze security policies

TitreAutomata-based approach to design and analyze security policies
Publication TypeConference Paper
Year of Publication2014
AuthorsKrombi, Wa, Erradi, Ma, Khoumsi, Ab
Conference Name2014 12th Annual Conference on Privacy, Security and Trust, PST 2014
Abstract

Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using informal text, which implies ambiguities and inconsistencies in security rules. Our objective in this paper is to develop a formal approach to design and analyze security policies. We propose a procedure that synthesizes an automaton which implements a given security policy. Our automata-based approach can be a common basis to analyze several aspects of security policies. We use our automata-based approach to develop three analysis procedures to: verify completeness of a security policy, detect anomalies in a security policy, and detect functional discrepancies between several implementations of a security policy. We illustrate our approach using examples of security policies for a firewall. © 2014 IEEE.

URLhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-84910095793&doi=10.1109%2fPST.2014.6890953&partnerID=40&md5=c203c3363442208f90fb65f844c4a72b
DOI10.1109/PST.2014.6890953
Revues: 

Partenaires

Localisation


Location map

Suivez-nous sur

  

Contactez-nous

ENSIAS

Avenue Mohammed Ben Abdallah Regragui, Madinat Al Irfane, BP 713, Agdal Rabat, Maroc

Résultat de recherche d'images pour "icone fax" Télécopie : (+212) 5 37 77 72 30

    Compteur de visiteurs:280,090
    Education - This is a contributing Drupal Theme
    Design by WeebPal.