Review of Abstraction and Refinement of Layered Security Policy
نویسنده
چکیده
ion and Refinement of Layered Security Policy by Marshall Abrams and David Bailey
منابع مشابه
Interference Analysis for Dependable Systems Using Refinement and Abstraction
A common requirement for modern distributed and reactive systems is a high dependability guaranteeing reliability and security. The rigorous analysis of dependable systems specifications is of paramount importance for the reliability and security of these systems. A two-layered modal specification notation will allow the specification of services and protocols for distributed dependable systems...
متن کاملLayered multipoint network defense and security policy enforcement
This paper discusses the enhancement of security in general purpose operating systems, especially related to threats caused by internetworking, using extensions to operating systems. Such mechanisms have a significantly larger basis for reaching security policy decisions than older host-level security mechanisms and firewalls. By layering defensive mechanisms yet enforcing a consistent security...
متن کاملSums and Lovers: Case Studies in Security, Compositionality and Refinement
A truly secure protocol is one which never violates its security requirements, no matter how bizarre the circumstances, provided those circumstances are within its terms of reference. Such cast-iron guarantees, as far as they are possible, require formal techniques: proof or model-checking. Informally, they are difficult or impossible to achieve. Our technique is refinement, until recently not ...
متن کاملAutomatic Verification of Distributed and Layered Security Policy Implementations
Access control has long been the linchpin of intrusion prevention. Modern networked systems that are intended to be secure have a global policy, usually implicit, that specifies the overall system-level objectives with respect to access to various resources. The policy indicates both what is inadmissible, so that the intrusion attempts from within and without the network may be prevented, and w...
متن کاملEfficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement
Stateful security policies—which specify restrictions on behavior in terms of temporal safety properties—are a powerful tool for administrators to control the behavior of untrusted programs. However, the runtime overhead required to enforce them on real programs can be high. This paper describes a technique for rewriting programs to incorporate runtime checks so that all executions of the resul...
متن کامل