DocumentCode :
2953309
Title :
Hybrid Multi-module Security Policy Verification
Author :
Kotenko, Igor ; Chervatuk, Olga ; Sidelnikova, Ekaterina ; Tishkov, Artem
Author_Institution :
St. Petersburg Inst. for Informatics & Autom., St. Petersburg
fYear :
2007
fDate :
13-15 June 2007
Firstpage :
277
Lastpage :
277
Abstract :
To build a powerful and flexible security policy verification tool, it is very important to use the approach which allows covering all possible inconsistencies, has open (extendable) architecture and efficient verification implementation. We suggest using a family of different verification modules each of which can work with acceptable computational complexity for the particular types of conflicts, the system scale and the policy complication. The poster describes a common approach to security policy verification and presents a novel hybrid multi-module security checker (SEC) software tool that can serve as a security policy debugger for various categories of security policy, including authentication, authorization, filtering, channel protection and operational rules.
Keywords :
authorisation; computational complexity; filtering theory; formal verification; message authentication; program debugging; software architecture; software tools; authentication; authorization; channel protection; computational complexity; extendable architecture; filtering; multimodule security policy verification; open architecture; operational rules; security policy debugger; software tool; Authentication; Authorization; Automation; Computational complexity; Computer architecture; Data security; Filtering; Informatics; Information security; Software tools;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Policies for Distributed Systems and Networks, 2007. POLICY '07. Eighth IEEE International Workshop on
Conference_Location :
Bologna
Print_ISBN :
0-7695-2767-1
Type :
conf
DOI :
10.1109/POLICY.2007.25
Filename :
4262603
Link To Document :
بازگشت