Back to Search Start Over

Hybrid Multi-module Security Policy Verification

Authors :
Ekaterina Sidelnikova
Igor Kotenko
O. Chervatuk
Artem Tishkov
Source :
POLICY
Publication Year :
2007
Publisher :
IEEE, 2007.

Abstract

To build a powerful and flexible security policy verification tool, it is very important to use the approach which allows covering all possible inconsistencies, has open (extendable) architecture and efficient verification implementation. We suggest using a family of different verification modules each of which can work with acceptable computational complexity for the particular types of conflicts, the system scale and the policy complication. The poster describes a common approach to security policy verification and presents a novel hybrid multi-module security checker (SEC) software tool that can serve as a security policy debugger for various categories of security policy, including authentication, authorization, filtering, channel protection and operational rules.

Details

Database :
OpenAIRE
Journal :
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)
Accession number :
edsair.doi...........884c12defd2f4f5880add672c1e7ec4c