DocumentCode :
1801088
Title :
Using security policies in a network securing process
Author :
Abassi, Ryma ; Fatmi, Sihem Guemara El
Author_Institution :
Higher Sch. of Commun., Univ. of Carthage, Tunis, Tunisia
fYear :
2011
fDate :
8-11 May 2011
Firstpage :
416
Lastpage :
421
Abstract :
A security policy constitutes one of the major actors in the protection of communication networks but can be one of their drawbacks too. This can be the case if it is inadequate to the security requirements for example. For this, a security policy has to be checked before its real deployment. In this paper, we propose three checking activities each of which is adapted to a given phase of the policy deployment process. This activities deal with the SP validation, the SP testing and the multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.
Keywords :
computer network security; software engineering; SP testing; SP validation; communication networks; multiSP conflict management; network securing process; policy deployment process; security policies; software engineering; Authorization; Automata; Silicon; Software engineering; Syntactics; Testing; conflict; executable specification; security policy; test; validation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Telecommunications (ICT), 2011 18th International Conference on
Conference_Location :
Ayia Napa
Print_ISBN :
978-1-4577-0025-5
Type :
conf
DOI :
10.1109/CTS.2011.5898961
Filename :
5898961
Link To Document :
بازگشت