2014
DOI: 10.1007/978-3-662-43613-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Verifying Security Policies Using Host Attributes

Abstract: For the formal verification of a network security policy, it is crucial to express the verification goals. These formal goals, called security invariants, should be easy to express for the end user. Focusing on access control and information flow security strategies, this work discovers and proves universal insights about security invariants. This enables secure and convenient auto-completion of host attribute configurations. We demonstrate our results in a civil aviation scenario. All results are machine-veri… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
2
2

Relationship

4
2

Authors

Journals

citations
Cited by 9 publications
(26 citation statements)
references
References 17 publications
0
26
0
Order By: Relevance
“…For details on the architecture and working principles of topoS we refer to the original publication [7].…”
Section: Designing the Network With Toposmentioning
confidence: 99%
See 4 more Smart Citations
“…For details on the architecture and working principles of topoS we refer to the original publication [7].…”
Section: Designing the Network With Toposmentioning
confidence: 99%
“…First, Alice collects the entities in her setup: INET , WebApp, WebFrnt, DB , and Log. Now, topoS provides a modular, attribute-based language [7] to specify the security requirements. topoS comes with a pre-defined library of security invariant templates as listed in Table I A template formalizes generic, scenario-independent aspects of a security goal and must be formally defined in topoS using Isabelle/HOL.…”
Section: A Formalizing High-level Security Goalsmentioning
confidence: 99%
See 3 more Smart Citations