Verifying security policies using host attributes

Cornelius Diekmann, Stephan A. Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, Georg Carle

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

5 Zitate (Scopus)

Abstract

For the formal verification of a network security policy, it is crucial to express the verification goals. These formal goals, called security invariants, should be easy to express for the end user. Focusing on access control and information flow security strategies, this work discovers and proves universal insights about security invariants. This enables secure and convenient auto-completion of host attribute configurations. We demonstrate our results in a civil aviation scenario. All results are machine-verified with the Isabelle/HOL theorem prover.

OriginalspracheEnglisch
TitelFormal Techn. for Distrib. Objects, Components, and Systems - 34th IFIPWG6.1 Int. Conf. FORTE 2014, Held as Part of the 9th Int. Federated Conf. on Distrib. Computing Techn. DisCoTec 2014, Proc.
Herausgeber (Verlag)Springer Verlag
Seiten133-148
Seitenumfang16
ISBN (Print)9783662436127
DOIs
PublikationsstatusVeröffentlicht - 2014
Veranstaltung34th IFIPWG6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014 - Berlin, Deutschland
Dauer: 3 Juni 20145 Juni 2014

Publikationsreihe

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Band8461 LNCS
ISSN (Print)0302-9743
ISSN (elektronisch)1611-3349

Konferenz

Konferenz34th IFIPWG6.1 International Conference on Formal Techniques for Distributed Objects, Components, and Systems, FORTE 2014 - Held as Part of the 9th International Federated Conference on Distributed Computing Techniques, DisCoTec 2014
Land/GebietDeutschland
OrtBerlin
Zeitraum3/06/145/06/14

Fingerprint

Untersuchen Sie die Forschungsthemen von „Verifying security policies using host attributes“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren