International audienceWe address the issue of formally validating the deployment of access control security policies. We show how the use of a formal expression of the security requirements, related to a given system, ensures the deployment of an anomaly free abstract security policy. We also describe how to develop appropriate algorithms by using a theorem proving approach with a modeling language allowing the specification of the system, of the link between the system and the policy, and of certain target security properties. The result is a set of proved algorithms that constitute the certified technique for a reliable security policy deployment
International audienceIn the security domain, the access control consists in specifying who can acce...
The last years have seen the definition of many languages, models and standards tailored to specify ...
International audienceSecurity policies are ubiquitous in information systems and more generally in ...
International audienceWe address the issue of formally validating the deployment of access control s...
We focus in this paper on the problem of configuring and managing network security devices, such as ...
We address the proof-based development of (system) models satisfying a security policy. The security...
International audienceSecurity is a key-challenge for software engineering, especially when consider...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
Security policies are enforced through the deployment of certain security functionalities within th...
Security is a critical concern for any information system. Security properties such as confidentiali...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
The advent of large-scale, complex computing systems has dramatically increased the difficulties of ...
peer reviewedModel-Driven Security is a specialization of Model-Driven Engineering (MDE) that focuse...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...
In order to protect resources from unauthorized access and data leakage in companies, security exper...
International audienceIn the security domain, the access control consists in specifying who can acce...
The last years have seen the definition of many languages, models and standards tailored to specify ...
International audienceSecurity policies are ubiquitous in information systems and more generally in ...
International audienceWe address the issue of formally validating the deployment of access control s...
We focus in this paper on the problem of configuring and managing network security devices, such as ...
We address the proof-based development of (system) models satisfying a security policy. The security...
International audienceSecurity is a key-challenge for software engineering, especially when consider...
The construction of secure software is a notoriously difficult task. The abstract security requireme...
Security policies are enforced through the deployment of certain security functionalities within th...
Security is a critical concern for any information system. Security properties such as confidentiali...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
The advent of large-scale, complex computing systems has dramatically increased the difficulties of ...
peer reviewedModel-Driven Security is a specialization of Model-Driven Engineering (MDE) that focuse...
Abstract. If an access control policy promises that a resource is protected in a system, how do we k...
In order to protect resources from unauthorized access and data leakage in companies, security exper...
International audienceIn the security domain, the access control consists in specifying who can acce...
The last years have seen the definition of many languages, models and standards tailored to specify ...
International audienceSecurity policies are ubiquitous in information systems and more generally in ...