Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived from the abstract policies (defined by the modeller), we must be sure that the derived policies uphold the high-level ones. This paper builds upon previous work on Model-based Management, particularly on the Diagram of Abstract Subsystems approach, and goes further to propose a formal validation approach for the policy hierarchies yielded by the automated policy refinement process. We establish general valid...
University of Technology, Sydney. Faculty of Information Technology.Policy-Based Networks (PBNs) pro...
A policy is an execution rule (or constraint) for objects in a system to retain security and integri...
Abstract — Verified and validated security policies are essential components of high assurance compu...
Policy hierarchies and automated policy refinement are powerful approaches to simplify administratio...
In today’s network environments the integrated design and management of different security technolog...
Policy refinement is meant to derive low-level enforceable policies from high-level guidelines. Alth...
Policy-based security management of computer networks is one of the most actual directions of resear...
With the ever increasing importance of computer networks such as the Internet,and the today almost u...
Security Policies constitute the core of network protection infrastructures. However, their developm...
In a policy-based system management, a policy refinement process is required to translate abstract p...
A common requirement in policy specification languages is the ability to map policies to the underly...
International audienceIn the area of networks, a common method to enforce a security policy expresse...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
University of Technology, Sydney. Faculty of Information Technology.Policy-Based Networks (PBNs) pro...
A policy is an execution rule (or constraint) for objects in a system to retain security and integri...
Abstract — Verified and validated security policies are essential components of high assurance compu...
Policy hierarchies and automated policy refinement are powerful approaches to simplify administratio...
In today’s network environments the integrated design and management of different security technolog...
Policy refinement is meant to derive low-level enforceable policies from high-level guidelines. Alth...
Policy-based security management of computer networks is one of the most actual directions of resear...
With the ever increasing importance of computer networks such as the Internet,and the today almost u...
Security Policies constitute the core of network protection infrastructures. However, their developm...
In a policy-based system management, a policy refinement process is required to translate abstract p...
A common requirement in policy specification languages is the ability to map policies to the underly...
International audienceIn the area of networks, a common method to enforce a security policy expresse...
In a typical enterprise network, there are several sub-networks or network zones corresponding to di...
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
University of Technology, Sydney. Faculty of Information Technology.Policy-Based Networks (PBNs) pro...
A policy is an execution rule (or constraint) for objects in a system to retain security and integri...
Abstract — Verified and validated security policies are essential components of high assurance compu...