International audienceIn this paper, we propose a security methodology that automates the process of security zone specification and high-level network security requirements elicitation. We define a set of formalized rules derived from the principles of complete mediation, least privileges and the Clark-Wilson lite formal model making our approach traceable and verifiable. We implemented the methodology in Answer Set Programming to automatically compute an optimal network security zone model considering the cost of the security solution. A use case study of an e-commerce enterprise network infrastructure illustrates our methodology
Network defense implies a comprehensive set of software tools to preclude malicious entities from co...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Abstract: This work presents a framework for network system development that introduces a new phase ...
International audienceIn this paper, we propose a security methodology that automates the process of...
Abstract- E-commerce is becoming a precondition and a form of commerce in the modern settings of org...
Today's computer systems and applications are based on a globally internet worked infrastructure, co...
Abstract: This work presents a framework for network security system development that introduces a n...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
In today’s society, serious organizations need protection against both internal and external attacks...
The use of formal models to guide security design is appealing. This paper presents a model driven a...
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and...
International audienceConsidering the multitude of security requirements engineering methodologies a...
In this paper we use Security Evaluation Criteria as basis to develop the Network access control mod...
Security system architecture governs the composition of components in security systems and interacti...
International audienceAn effective network security requirement engineering is needed to help organi...
Network defense implies a comprehensive set of software tools to preclude malicious entities from co...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Abstract: This work presents a framework for network system development that introduces a new phase ...
International audienceIn this paper, we propose a security methodology that automates the process of...
Abstract- E-commerce is becoming a precondition and a form of commerce in the modern settings of org...
Today's computer systems and applications are based on a globally internet worked infrastructure, co...
Abstract: This work presents a framework for network security system development that introduces a n...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
In today’s society, serious organizations need protection against both internal and external attacks...
The use of formal models to guide security design is appealing. This paper presents a model driven a...
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and...
International audienceConsidering the multitude of security requirements engineering methodologies a...
In this paper we use Security Evaluation Criteria as basis to develop the Network access control mod...
Security system architecture governs the composition of components in security systems and interacti...
International audienceAn effective network security requirement engineering is needed to help organi...
Network defense implies a comprehensive set of software tools to preclude malicious entities from co...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Abstract: This work presents a framework for network system development that introduces a new phase ...