Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
DOI: 10.1109/secpri.1997.601324
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing consistency of security policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
53
0
4

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 69 publications
(57 citation statements)
references
References 8 publications
0
53
0
4
Order By: Relevance
“…Because disagreements naturally arise among administrators, FSL was designed so that those disagreements would manifest as conflicts in policies [53,36,12,10,24,27,48,11,7]. Conflicts between policy modules entered by different administrators can be detected by automated methods [44,7,36] that can be built into policy management tools.…”
Section: Related Workmentioning
confidence: 99%
“…Because disagreements naturally arise among administrators, FSL was designed so that those disagreements would manifest as conflicts in policies [53,36,12,10,24,27,48,11,7]. Conflicts between policy modules entered by different administrators can be detected by automated methods [44,7,36] that can be built into policy management tools.…”
Section: Related Workmentioning
confidence: 99%
“…The developed algorithm can detect all possible conflicts among IPSec policies in a distributed environment. The consistency analysis of security policies in [15] focuses on access control policy while our work focuses on topologically interacted IPSec policies.…”
Section: Related Workmentioning
confidence: 99%
“…Most prior work in the policy field can be divided into three major categories: policy specification [3,5], resolving policy conflicts [6,7], and distributed enforcement [8,9].…”
Section: Related Workmentioning
confidence: 99%
“…Cholvy, et al [7] describe a method for resolving that inconsistency and show that the problem is exacerbated in large-scale networks. As with PolicyMaker and SPKI, this method may facilitate path-based access control but it does not provide the information transfer necessary for resolving violated system administrator assumptions.…”
Section: Related Workmentioning
confidence: 99%