首页> 外文会议>3rd ACM workshop on assurable amp; usable security configuration 2010 >Generating Policy based Security Implementations in Enterprise Networks-A formal framework
【24h】

Generating Policy based Security Implementations in Enterprise Networks-A formal framework

机译:在企业网络中生成基于策略的安全性实施-正式框架

获取原文
获取原文并翻译 | 示例

摘要

The security management of a typical enterprise network, comprises of several network zones, is usually governed by the organizational security policy. The policy defines the service accesses (permit/deny) between various network zones. The security implementation attempts to realize the policy through sets of access control lists (ACLs) in the network interfaces. This paper presents a framework for generating the correct implementation model, given the organizational security policy and underlying network topology. There are two major challenges, namely, (i) deriving the conflict-free model of the organizational security policy and (ii) extraction of the correct ACL distributions for the network. The framework formally models the organizational security policy and generates the conflict-free policy model by resolving the policy rule conflicts. Then, ACL implementation model is extracted based on the conflict-free policy model and the underlying network topology. The efficacy of the proposed framework has been demonstrated through a case study.
机译:由多个网络区域组成的典型企业网络的安全性管理通常由组织安全性策略控制。该策略定义了各个网络区域之间的服务访问(许可/拒绝)。安全实现尝试通过网络接口中的访问控制列表(ACL)集来实现策略。给出组织安全策略和底层网络拓扑的情况下,本文提出了一种用于生成正确实施模型的框架。存在两个主要挑战,即(i)推导组织安全策略的无冲突模型,以及(ii)为网络提取正确的ACL分配。该框架正式为组织安全策略建模,并通过解决策略规则冲突来生成无冲突策略模型。然后,基于无冲突策略模型和底层网络拓扑提取ACL实现模型。案例研究证明了所提出框架的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号