2008
DOI: 10.4304/jcp.3.6.22-31
|View full text |Cite
|
Sign up to set email alerts
|

Formal Verification and Visualization of Security Policies

Abstract: <p class="MsoNormal" style="text-align: left; margin: 0cm 0cm 0pt; layout-grid-mode: char;" align="left"><span class="text"><span style="font-family: ";Arial";,";sans-serif";; font-size: 9pt;">Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes in the development, deployment, and maintenance of such systems. In this paper, we introduce an expert system that helps with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…The abstracts for these publications can be found in final section of this report. Publications related to design and analysis of MILS system are filed under the following keys: Alves-Foss02a [29], Alves-Foss04a [32], Alves-Foss04b [34], Alves-Foss06a [30], ConteDeLeon02b [81], ConteDeLeon06a [82], ConteDeLeon06b [83], ConteDeLeon07a [84], Dai03a [88], Hanebutte05a [124], Harrison05a [127], Joy06a [135], Oman04a [209], Robinson07a, [221], Robinson07b [222], Robinson07c [223], Rossebo06a [227], Son06a [246], Son07a [247], Son08a [245], Taylor04a [254], Wahsheh06a [261], Wahsheh07a [262], Wahsheh07b [263], Wahsheh08a [260], Wahsheh08b [264], Wahsheh08c [265], Wang06e [267], Wang06f [266], Yang05d [274], Zhou06c [287], and Zhou08a [285].…”
Section: Computation Sequential Exponentiationmentioning
confidence: 99%
“…The abstracts for these publications can be found in final section of this report. Publications related to design and analysis of MILS system are filed under the following keys: Alves-Foss02a [29], Alves-Foss04a [32], Alves-Foss04b [34], Alves-Foss06a [30], ConteDeLeon02b [81], ConteDeLeon06a [82], ConteDeLeon06b [83], ConteDeLeon07a [84], Dai03a [88], Hanebutte05a [124], Harrison05a [127], Joy06a [135], Oman04a [209], Robinson07a, [221], Robinson07b [222], Robinson07c [223], Rossebo06a [227], Son06a [246], Son07a [247], Son08a [245], Taylor04a [254], Wahsheh06a [261], Wahsheh07a [262], Wahsheh07b [263], Wahsheh08a [260], Wahsheh08b [264], Wahsheh08c [265], Wang06e [267], Wang06f [266], Yang05d [274], Zhou06c [287], and Zhou08a [285].…”
Section: Computation Sequential Exponentiationmentioning
confidence: 99%
“…Formal methods, using logic as a tool, have been already used for policy verification [ 4 6 ]. They all have in common essentially these issues: (i) only directive policies are considered, and many operations can be required [ 7 9 ]; (ii) only consistency of implemented policies is verified, without proper contrast to directive policies.…”
Section: Introductionmentioning
confidence: 99%
“… General security models [ 10 , 11 ]. Logic models for security policy checking [ 6 , 12 ]. Implemented policy detection with data mining, [ 13 ].…”
Section: Introductionmentioning
confidence: 99%