Model-Driven security policy deployment: property oriented approach

  • Authors:
  • Stere Preda;Nora Cuppens-Boulahia;Frédéric Cuppens;Joaquin Garcia-Alfaro;Laurent Toutain

  • Affiliations:
  • IT TELECOM Bretagne CS 17607, 35576 Cesson-Sévigné, France;IT TELECOM Bretagne CS 17607, 35576 Cesson-Sévigné, France;IT TELECOM Bretagne CS 17607, 35576 Cesson-Sévigné, France;IT TELECOM Bretagne CS 17607, 35576 Cesson-Sévigné, France;IT TELECOM Bretagne CS 17607, 35576 Cesson-Sévigné, France

  • Venue:
  • ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

We address the issue of formally validating the deployment of access control security policies. We show how the use of a formal expression of the security requirements, related to a given system, ensures the deployment of an anomaly free abstract security policy. We also describe how to develop appropriate algorithms by using a theorem proving approach with a modeling language allowing the specification of the system, of the link between the system and the policy, and of certain target security properties. The result is a set of proved algorithms that constitute the certified technique for a reliable security policy deployment.