System Maintenance Notice:
Single article purchases and IEEE account management are currently unavailable. We apologize for the inconvenience.
By Topic

Hybrid Multi-module Security Policy Verification

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
4 Author(s)
Kotenko, I. ; St. Petersburg Inst. for Informatics & Autom., St. Petersburg ; Chervatuk, O. ; Sidelnikova, E. ; Tishkov, A.

To build a powerful and flexible security policy verification tool, it is very important to use the approach which allows covering all possible inconsistencies, has open (extendable) architecture and efficient verification implementation. We suggest using a family of different verification modules each of which can work with acceptable computational complexity for the particular types of conflicts, the system scale and the policy complication. The poster describes a common approach to security policy verification and presents a novel hybrid multi-module security checker (SEC) software tool that can serve as a security policy debugger for various categories of security policy, including authentication, authorization, filtering, channel protection and operational rules.

Published in:

Policies for Distributed Systems and Networks, 2007. POLICY '07. Eighth IEEE International Workshop on

Date of Conference:

13-15 June 2007