Formal Aspects in Security and Trust
DOI: 10.1007/0-387-24098-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Reasoning about Secure Interoperation Using Soft Constraints

Abstract: The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
2
1
1

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…In [2] soft constraints are used to represent confidentiality and authentication properties of security protocols. A soft constraint based model is used in [10] to analyze the secure interoperation problem in [16]. These results, and the results in this paper, demonstrate the usefulness of constraints as a general purpose modelling technique for security.…”
Section: Resultsmentioning
confidence: 56%
“…In [2] soft constraints are used to represent confidentiality and authentication properties of security protocols. A soft constraint based model is used in [10] to analyze the secure interoperation problem in [16]. These results, and the results in this paper, demonstrate the usefulness of constraints as a general purpose modelling technique for security.…”
Section: Resultsmentioning
confidence: 56%
“…The integrity of a system can then be evaluated by checking how much it satisfies some specified (soft) constraints [14,15]. In a similar manner, by adding constraints on the type of flow permitted or denied among the nodes of a network, a flow analysis can be executed, revealing inter-operation [16] or cascading [17,18] problems.…”
Section: Securitymentioning
confidence: 99%
“…The model that is proposed in this paper forms a part of our ongoing research in using constraint solving techniques as a practical approach for reasoning about security [1,[3][4][5]31]. Building on the results in [4] we demonstrate in this paper that determining whether a particular system configuration meets a quality of protection measure can be described as a constraint satisfaction problem.…”
Section: Introductionmentioning
confidence: 86%