Network security policy refinement process: Expression and analysis

ISSN: 09266801
3Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

Abstract

Today, users need to access their granted services from anywhere and at any time. Network security management must evolve to satisfy these requirements. The policy based network management approach proposes to separate the rules that govern the system from the functionalities provided by it. Nevertheless, the policy rules should be consistent, correct against the objectives and enforceable onto the devices. This problem becomes complex considering the dependencies of the rules - each rule on a device can impact another rule on another device - and each device needs specific configuration according to the technologies implemented. This article presents a formal framework for the refinement of network security management information. It includes three abstraction levels: the network security objectives, the network security tactics and the network security devices configurations. The information models of each abstraction level are formally specified and analysed (consistency, correctness and feasibility). A WBEM implementation of the formal refinement framework proves its feasibility in management architectures. © 2006 - IOS Press and the authors. All rights reserved.

Cite

CITATION STYLE

APA

Laborde, R., Barrère, F., & Benzekri, A. (2006). Network security policy refinement process: Expression and analysis. Journal of High Speed Networks, 15(3), 247–260.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free