Ver registro no DEDALUS
Exportar registro bibliográfico

Metrics


Metrics:

Formal validation of automated policy refinement in the management of network security systems (2010)

  • Authors:
  • USP affiliated authors: PEREIRA, JOÃO PORTO DE ALBUQUERQUE - EACH
  • USP Schools: EACH
  • DOI: 10.1007/s10207-010-0101-6
  • Subjects: SEGURANÇA DE REDES; SISTEMAS DE INFORMAÇÃO; GESTÃO DA SEGURANÇA EM SISTEMAS COMPUTACIONAIS
  • Language: Inglês
  • Imprenta:
  • Source:
  • Acesso online ao documento

    Online accessDOI or search this record in
    Informações sobre o DOI: 10.1007/s10207-010-0101-6 (Fonte: oaDOI API)
    • Este periódico é de assinatura
    • Este artigo NÃO é de acesso aberto
    • Cor do Acesso Aberto: closed
    Versões disponíveis em Acesso Aberto do: 10.1007/s10207-010-0101-6 (Fonte: Unpaywall API)

    Título do periódico: International Journal of Information Security

    ISSN: 1615-5262,1615-5270



      Não possui versão em Acesso aberto
    Informações sobre o Citescore
  • Título: International Journal of Information Security

    ISSN: 1615-5262

    Citescore - 2017: 2.71

    SJR - 2017: 0.555

    SNIP - 2017: 1.947


  • How to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas

    • ABNT

      ALBUQUERQUE, João Porto de; KRUMM, Heiko; GEUS, Paulo Lício. Formal validation of automated policy refinement in the management of network security systems. International Journal of Information Security, Heidelberg, v. 9, n. 2, p. 99-125, 2010. Disponível em: < http://dx.doi.org/10.1007/s10207-010-0101-6 > DOI: 10.1007/s10207-010-0101-6.
    • APA

      Albuquerque, J. P. de, Krumm, H., & Geus, P. L. (2010). Formal validation of automated policy refinement in the management of network security systems. International Journal of Information Security, 9( 2), 99-125. doi:10.1007/s10207-010-0101-6
    • NLM

      Albuquerque JP de, Krumm H, Geus PL. Formal validation of automated policy refinement in the management of network security systems [Internet]. International Journal of Information Security. 2010 ; 9( 2): 99-125.Available from: http://dx.doi.org/10.1007/s10207-010-0101-6
    • Vancouver

      Albuquerque JP de, Krumm H, Geus PL. Formal validation of automated policy refinement in the management of network security systems [Internet]. International Journal of Information Security. 2010 ; 9( 2): 99-125.Available from: http://dx.doi.org/10.1007/s10207-010-0101-6

    Referências citadas na obra
    Abrams, M., Bailey, D.: Abstraction and refinement of layered security policy. In: Abrams, M., Jajodia, S., Podell, H. (eds.) Information Security: An Integrated Collection of Essays, pp. 126–136. IEEE Computer Society Press, Los Alamitos (1994)
    Bartal Y., Mayer A.J., Nissim K., Wool A.: Firmato: a novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4), 381–420 (2004)
    Burns, J., Cheng, A., Gurung, P., Rajagopalan, S., Rao, P., Rosenbluth, D., Surendran, A., D.M., Jr.: Automatic management of network security policy. In: DARPA Information Survivability Conference and Exposition (DISCEX II’01), vol. 2 (2001)
    Common Criteria Project: Common Criteria for Information Technology Security Evaluation (CC 2.2), Part 2: Security functional requirements (2004)
    Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miége, A.: A formal approach to specify and deploy a network security policy. In: Formal Aspects in Security and Trust (FAST 2004) (2004)
    de Albuquerque, J.P.: Model-based Configuration Management of Security Systems in Complex Network Environments. PhD thesis, Institute of Computing, University of Campinas (2006)
    de Albuquerque, J.P., Isenberg, H., Krumm, H., de Geus, P.L.: Improving the configuration management of large network security systems. In: Schönwälder, J., Serrat, J. (eds.) Ambient Networks: 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, 24–26 Oct 2005, Proceedings, vol. 3775 of Lecture Notes in Computer Science, pp. 36–47. Springer, Berlin (2005)
    de Albuquerque, J.P., Krumm, H., de Geus, P.L.: On scalability and modularisation in the modelling of security systems. In: di Vimercati, S.D.C., Syverson, P.F., Gollmann, D. (eds.) Computer Security—ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, 12–14 Sept 2005, Proceedings, vol. 3679 of Lecture Notes in Computer Science, pp. 287–304. Springer, Berlin (2005)
    de Albuquerque, J.P., Krumm, H., de Geus, P.L.: Policy modelling and refinement for network security systems. In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 6–8 June 2005, Stockholm, pp. 24–33, IEEE Computer Society, Washington (2005)
    de Albuquerque, J.P., Krumm, H., de Geus, P.L.: Model-based management of security services in complex network environments. In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7–11 Apr 2008, Salvador, pp. 1031–1036 (2008)
    Ferraiolo, D., Kuhn, R. Role-based access control. In: Proceeedings of 15th NIST-NCSC National Security Computer Conference, Baltimore (1992)
    Ferraiolo D.F., Barkley J.F., Kuhn D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 2(1), 34–64 (1999)
    Guttman, J.D.: Filtering postures: local enforcement for global policies. In: SP ’97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 120. IEEE Computer Society, Washington (1997)
    Institute of Electrical and Electronics Engineers, New York: IEEE Standard Glossary of Software Engineering Terminology (1990)
    Lück, I.: Model-based Security Service Configuration. PhD thesis, University of Dortmund, Germany (2006)
    Lück, I., Schäfer, C., Krumm, H.: Model-based tool-assistance for packet-filter design. In: Sloman, E.L.M., Lobo, J. (eds.) Proceedings of IEEE Workshop Policy 2001: Policies for Distributed Systems and Networks, number 1995 in Lecture Notes in Computer Science, pp. 120–136. Springer, Heidelberg (2001)
    Lück, I., Vögel, S., Krumm, H.: Model-based configuration of VPNs. In: Stadtler, R., Ulema, M. (eds.) Proceedings of 8th IEEE/IFIP Network Operations and Management Symposium NOMS 2002, pp. 589–602. IEEE, Florence (2002)
    Moffett J.D., Sloman M.S.: Policy hierarchies for distributed system management. IEEE JSAC Special Issue Netw. Manage. 11(9), 11 (1993)
    Mont, M., Baldwin, A., Goh, C.: POWER prototype: Towards integrated policy-based management. In: Hong, J., Weihmayer, R. (eds.) Proceedings of IEEE/IFIP Network Operations and Management Symposium (NOMS2000), pp. 789–802, Hawaii (2000)
    Sandhu R.S.: Lattice-based access control models. IEEE Comput. 26(11), 9–19 (1993)
    Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996)
    Sandhu, R.S., Samarati, P.: Access control: principles and practice. IEEE Commun. 32(9) (1994)
    Sloman M.: Policy driven management for distributed systems. J. Netw. Syst. Manage. 2(4), 333–360 (1994)
    Sloman M., Lupu E.C.: Security and management policy specification. IEEE Netw. Special Issue Policy-Based Netw. 16(2), 10–19 (2002)
    Westerinen, A., Schnizlein, J., Strassner, J., Scherling, M., Quinn, B., Herzog, S., Huynh, A., Carlson, M., Perry, J., Waldbusser, S.: Terminology for Policy-Based Management. Internet Engineering Task Force, (2001) RFC 3198
    Wies R.: Using a classification of management policies for policy specification and policy transformation. In: Sethi, A.S., Raynaud, Y., Fure-Vincent, F. (eds) Integrated Network Management IV, vol. 4, pp. 44–56. Chapman & Hall, Santa Barbara (1995)