13TH IEEE International Conference on Network Protocols (ICNP'05)
DOI: 10.1109/icnp.2005.25
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Verification of IPSec and VPN Security Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
57
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(57 citation statements)
references
References 11 publications
0
57
0
Order By: Relevance
“…General policy conflict analysis is not a novel problem, but its application in the context of SOA governance policies in this paper is original. Several approaches have been proposed for policy expression and conflict analysis in the context of network management [22], and security [23], but they are based on Binary Decision Diagrams (BDD), forcing the reasoning with less expressive policies than our CSP based proposal.…”
Section: Related Workmentioning
confidence: 99%
“…General policy conflict analysis is not a novel problem, but its application in the context of SOA governance policies in this paper is original. Several approaches have been proposed for policy expression and conflict analysis in the context of network management [22], and security [23], but they are based on Binary Decision Diagrams (BDD), forcing the reasoning with less expressive policies than our CSP based proposal.…”
Section: Related Workmentioning
confidence: 99%
“…In [1], the authors analyze firewall rules using an expert system whereas the authors of [8] analyze firewalls with relational algebra. In [3], the authors put forward a model for IPsec and VPN verification. However, these security components (homogenous or heterogeneous) may conflict when they are installed together on a network.…”
Section: Related Workmentioning
confidence: 99%
“…Firewall policy anomalies were presented in [8], [9] where a classification of rules conflicts is presented. The analysis was further extended to include multiple firewalls and IPSec policies [10], [11]. In [12], BDDs were also used to model distributed firewalls and discover policy anomalies, with improved complexity.…”
Section: Related Workmentioning
confidence: 99%