@inproceedings{bc0c9fb875d1428391506fe0aedc51b4,
title = "Verifying security policies using host attributes",
abstract = "For the formal verification of a network security policy, it is crucial to express the verification goals. These formal goals, called security invariants, should be easy to express for the end user. Focusing on access control and information flow security strategies, this work discovers and proves universal insights about security invariants. This enables secure and convenient auto-completion of host attribute configurations. We demonstrate our results in a civil aviation scenario. All results are machine-verified with the Isabelle/HOL theorem prover.",
author = "Cornelius Diekmann and Posselt, {Stephan A.} and Heiko Niedermayer and Holger Kinkelin and Oliver Hanka and Georg Carle",
year = "2014",
doi = "10.1007/978-3-662-43613-4_9",
language = "English",
isbn = "9783662436127",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "133--148",
booktitle = "Formal Techn. for Distrib. Objects, Components, and Systems - 34th IFIPWG6.1 Int. Conf. FORTE 2014, Held as Part of the 9th Int. Federated Conf. on Distrib. Computing Techn. DisCoTec 2014, Proc.",
note = "34th IFIPWG6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014 ; Conference date: 03-06-2014 Through 05-06-2014",
}