Automatic Enforcement of Security in Computer Networks

  • Authors:
  • T. Mechri;M. Langar;M. Mejri;H. Fujita;Y. Funyu

  • Affiliations:
  • Laval University, Quebec, Qc, Canada;Laval University, Quebec, Qc, Canada;Laval University, Quebec, Qc, Canada;Iwate Prefectural University, Japan;Iwate Prefectural University, Japan

  • Venue:
  • Proceedings of the 2007 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the sixth SoMeT_07
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The main issue of this paper is to propose a formal technique allowing to automatically configure a given network so that it will respect a given security policy. In other words, given a computer network N and a security policy Φ, we introduce a formal technique that automatically produce another network N' such that N' $\vDash$ Φ and N and N' behaves in an "equivalent" (with respect to a given de finition of equivalence) way. To that end, we define a new process algebra allowing to better specify and analyze monitored network. We also define an operator $\otimes$ that produce from an initial network N and a security policy Φ another version of the network, denoted by N $\otimes$ Φ, configured in such a way that the security policy is always respected.