Title
Security policy enforcement through refinement process
Abstract
In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue that it is possible to build a formal link between concrete and abstract terms, which can be dynamically computed from the environment data. In order to progressively introduce configuration data and then simplify the proof obligations, we use the B refinement process. We present a case study modeling a network monitor. This program, described by refinement following the layers of the TCP/IP suite protocol, has to warn for all observed events which do not respect the security policy. To design this model, we use the event-B method because it is suitable for modeling network concepts. This work has been done within the framework of the POTESTAT project [9], based on the research of network testing methods from a high-level security policy.
Year
DOI
Venue
2010
10.1007/11955757_18
B'07 Proceedings of the 7th international conference on Formal Specification and Development in B
Keywords
DocType
Volume
event-b method,security policy enforcement,network concept,high-level security policy,environment data,b refinement process,security policy,configuration data,network testing method,network monitor,common method,test methods,b method,secure computation,network monitoring,refinement,high level language
Journal
abs/1004.1460
ISSN
ISBN
Citations 
B 2007, besan\c{c}on : France (2007)
3-540-68760-2
6
PageRank 
References 
Authors
0.48
12
2
Name
Order
Citations
PageRank
Nicolas Stouls1405.42
Marie-Laure Potet219021.34