Security policy enforcement through refinement process

7Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT1 project [9], based on the research of network testing methods from a high-level security policy.

Cite

CITATION STYLE

APA

Stouls, N., & Potet, M. L. (2006). Security policy enforcement through refinement process. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4355 LNCS, pp. 216–231). Springer Verlag. https://doi.org/10.1007/11955757_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free