Abstract
Security mechanisms enforcement consists in configuring devices with the aim that they cooperate and guarantee the defined security goals. In the network context, this task is complex due to the number, the nature, and the interdependencies of the devices to consider. We propose in this article a global and formal framework which models the network security management information from the security goals to the security mechanisms configurations. The process is divided into three steps. First, the security goals are specified and the specification consistency is checked. Secondly, the network security tactics are defined. An evaluation method guarantees the consistency and the correctness against the security goals. Finally, the framework verifies that the network security tactics can be enforced by the real security mechanisms.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ANSI, Role-Based Access Control, ANSI/INCITS 359-2004 (February 2004)
Bartal., Y., Mayer, A., Nissim, K., Wool, A.: Firmato: A Novel Firewall Management Toolkit. In: Proceedings of 1999 IEEE Symposium on Security and Privacy (May 1999)
Bell, D.E., LaPadula, L.J.: Secure Computer Systems: Mathematical Foundations and Model.The Mitre Corporation, Bedford (1973)
Bishop, M.: Computer Security: Art and Science (2003), ISBN 0-201-44099-7
Al-Shaer, E., Hamed, H.: Discovery of Policy Anomalies in Distributed Firewalls. In: IEEE INFOCOMM 2004 (2004)
Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control (2003), ISBN: 1-58053-370-1
Fu, Z., Wu, F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C.: IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution. In: Policy 2001 Workshop (2001)
Guttman, J.D., Herzog, A.M.: Rigorous automated network security management. International Journal of Information Security 3(4) (2004)
ISO, OSI Reference Model - Security Architecture, ISO 7498-2 (1988)
Jensen, K.: An Introduction to the Theoretical Aspects of Coloured Petri Nets. In: de Bakker, J.W., de Roever, W.-P., Rozenberg, G. (eds.) REX 1993. LNCS, vol. 803. Springer, Heidelberg (1994)
Laborde, R., Nasser, B., Grasset, F., Barrère, F., Benzekri, A.: Network Security Management: A Formal Evaluation Tool based on RBAC Policies. In: IFIP NetCon 2004 (2004)
Laborde, R., Nasser, B., Grasset, F., Barrère, F., Benzékri, A.: A formal approach for the evaluation of network security mechanisms based on RBAC policies. In: ENTCS–proceedings of WISP 2004, vol. 121. Elsevier, Amsterdam (2005)
Moffett, J.D.: Control Principle and Role Hierarchies. In: Workshop on RBAC (1998)
Moffet, J., Sloman, M.: Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communications 11(9) (1993)
Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control To Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security 3(2), 85–106 (2002)
Samarati, P., De Capitani di Vimercati, S.: Access Control: Policies, Models and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, p. 137. Springer, Heidelberg (2001)
Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J., Waldbusser, S.: Terminology for Policy-Based Management. RFC 3198 (November 2001)
Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-based Admission Control. RFC 2753 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Laborde, R., Barrère, F., Benzekri, A. (2006). A Security Management Information Model Derivation Framework: From Goals to Configurations. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds) Formal Aspects in Security and Trust. FAST 2005. Lecture Notes in Computer Science, vol 3866. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11679219_16
Download citation
DOI: https://doi.org/10.1007/11679219_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-32628-1
Online ISBN: 978-3-540-32629-8
eBook Packages: Computer ScienceComputer Science (R0)