Verifying security policies using host attributes

5Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

For the formal verification of a network security policy, it is crucial to express the verification goals. These formal goals, called security invariants, should be easy to express for the end user. Focusing on access control and information flow security strategies, this work discovers and proves universal insights about security invariants. This enables secure and convenient auto-completion of host attribute configurations. We demonstrate our results in a civil aviation scenario. All results are machine-verified with the Isabelle/HOL theorem prover. © 2014 IFIP International Federation for Information Processing.

Cite

CITATION STYLE

APA

Diekmann, C., Posselt, S. A., Niedermayer, H., Kinkelin, H., Hanka, O., & Carle, G. (2014). Verifying security policies using host attributes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8461 LNCS, pp. 133–148). Springer Verlag. https://doi.org/10.1007/978-3-662-43613-4_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free