Skip to Main content Skip to Navigation
Conference papers

Model-driven security policy deployment: property oriented approach

Stere Preda 1 Nora Cuppens-Boulahia 1, 2 Frédéric Cuppens 1, 2 Joaquin Garcia Alfaro 1 Laurent Toutain 3, 4
2 Lab-STICC_TB_CID_SFIIS
Lab-STICC - Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance
4 OCIF - Objets communicants pour l'Internet du futur
Télécom Bretagne, IRISA-D2 - RÉSEAUX, TÉLÉCOMMUNICATION ET SERVICES
Abstract : We address the issue of formally validating the deployment of access control security policies. We show how the use of a formal expression of the security requirements, related to a given system, ensures the deployment of an anomaly free abstract security policy. We also describe how to develop appropriate algorithms by using a theorem proving approach with a modeling language allowing the specification of the system, of the link between the system and the policy, and of certain target security properties. The result is a set of proved algorithms that constitute the certified technique for a reliable security policy deployment.
Document type :
Conference papers
Complete list of metadatas

Cited literature [19 references]  Display  Hide  Download

https://hal.archives-ouvertes.fr/hal-00540842
Contributor : Bibliothèque Télécom Bretagne <>
Submitted on : Monday, November 29, 2010 - 12:35:41 PM
Last modification on : Wednesday, August 5, 2020 - 3:49:51 AM
Long-term archiving on: : Saturday, December 3, 2016 - 12:23:46 AM

File

essos2010.pdf
Files produced by the author(s)

Identifiers

Citation

Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia Alfaro, Laurent Toutain. Model-driven security policy deployment: property oriented approach. ESSos 2010 : second International symposium on Engineering Secure Software and Systems, Feb 2010, Pise, Italy. pp.123-139, ⟨10.1007/978-3-642-11747-3_10⟩. ⟨hal-00540842⟩

Share

Metrics

Record views

671

Files downloads

606