Formal validation of automated policy refinement in the management of network security systems


Autoria(s): ALBUQUERQUE, Joao Porto de; KRUMM, Heiko; GEUS, Paulo Licio de
Contribuinte(s)

UNIVERSIDADE DE SÃO PAULO

Data(s)

20/10/2012

20/10/2012

2010

Resumo

Policy hierarchies and automated policy refinement are powerful approaches to simplify administration of security services in complex network environments. A crucial issue for the practical use of these approaches is to ensure the validity of the policy hierarchy, i.e. since the policy sets for the lower levels are automatically derived from the abstract policies (defined by the modeller), we must be sure that the derived policies uphold the high-level ones. This paper builds upon previous work on Model-based Management, particularly on the Diagram of Abstract Subsystems approach, and goes further to propose a formal validation approach for the policy hierarchies yielded by the automated policy refinement process. We establish general validation conditions for a multi-layered policy model, i.e. necessary and sufficient conditions that a policy hierarchy must satisfy so that the lower-level policy sets are valid refinements of the higher-level policies according to the criteria of consistency and completeness. Relying upon the validation conditions and upon axioms about the model representativeness, two theorems are proved to ensure compliance between the resulting system behaviour and the abstract policies that are modelled.

Identificador

INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.9, n.2, p.99-125, 2010

1615-5262

http://producao.usp.br/handle/BDPI/28990

10.1007/s10207-010-0101-6

http://dx.doi.org/10.1007/s10207-010-0101-6

Idioma(s)

eng

Publicador

SPRINGER

Relação

International Journal of Information Security

Direitos

restrictedAccess

Copyright SPRINGER

Palavras-Chave #Policy refinement #Model-based management #Formal validation #Security policies #Policy based management #Network security #Computer Science, Information Systems #Computer Science, Software Engineering #Computer Science, Theory & Methods
Tipo

article

original article

publishedVersion