【24h】

A Model-Based Method for Security Configuration Verification

机译:一种基于模型的安全配置验证方法

获取原文
获取原文并翻译 | 示例

摘要

Various kinds of access control mechanisms have been employed in today's computer systems to protect confidential information. Since high expertise is required for the system configuration maintenance, detecting vulnerabilities due to configuration errors is a difficult task. In this paper, we propose a model-based configuration verification method that can find complex errors of two major access control mechanisms, network packet filtering and file access control. This method constructs an information flow model using the configurations of the two mechanisms and verifies whether the system is configured to suffice access policies defined by system administrators. Through the development of a prototype system and its experimental use, we confirmed that the proposed method could discover configuration errors of Web servers that might cause information leakage.
机译:在当今的计算机系统中,已经采用了各种访问控制机制来保护机密信息。由于维护系统配置需要专业知识,因此检测由于配置错误引起的漏洞是一项艰巨的任务。在本文中,我们提出了一种基于模型的配置验证方法,该方法可以发现两种主要访问控制机制(网络数据包过滤和文件访问控制)的复杂错误。此方法使用这两种机制的配置来构造信息流模型,并验证系统是否配置为满足系统管理员定义的访问策略。通过原型系统的开发和实验使用,我们证实了该方法可以发现可能导致信息泄漏的Web服务器配置错误。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号