DocumentCode
1801088
Title
Using security policies in a network securing process
Author
Abassi, Ryma ; Fatmi, Sihem Guemara El
Author_Institution
Higher Sch. of Commun., Univ. of Carthage, Tunis, Tunisia
fYear
2011
fDate
8-11 May 2011
Firstpage
416
Lastpage
421
Abstract
A security policy constitutes one of the major actors in the protection of communication networks but can be one of their drawbacks too. This can be the case if it is inadequate to the security requirements for example. For this, a security policy has to be checked before its real deployment. In this paper, we propose three checking activities each of which is adapted to a given phase of the policy deployment process. This activities deal with the SP validation, the SP testing and the multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.
Keywords
computer network security; software engineering; SP testing; SP validation; communication networks; multiSP conflict management; network securing process; policy deployment process; security policies; software engineering; Authorization; Automata; Silicon; Software engineering; Syntactics; Testing; conflict; executable specification; security policy; test; validation;
fLanguage
English
Publisher
ieee
Conference_Titel
Telecommunications (ICT), 2011 18th International Conference on
Conference_Location
Ayia Napa
Print_ISBN
978-1-4577-0025-5
Type
conf
DOI
10.1109/CTS.2011.5898961
Filename
5898961
Link To Document