Verifying Security Policies Using Host Attributes - Formal Techniques for Distributed Objects, Components, and Systems Access content directly
Conference Papers Year : 2014

Verifying Security Policies Using Host Attributes


For the formal verification of a network security policy, it is crucial to express the verification goals. These formal goals, called security invariants, should be easy to express for the end user. Focusing on access control and information flow security strategies, this work discovers and proves universal insights about security invariants. This enables secure and convenient auto-completion of host attribute configurations. We demonstrate our results in a civil aviation scenario. All results are machine-verified with the Isabelle/HOL theorem prover.
Fichier principal
Vignette du fichier
978-3-662-43613-4_9_Chapter.pdf (477.05 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01398013 , version 1 (16-11-2016)





Cornelius Diekmann, Stephan-A. Posselt, Heiko Niedermayer, Holger Kinkelin, Oliver Hanka, et al.. Verifying Security Policies Using Host Attributes. 34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.133-148, ⟨10.1007/978-3-662-43613-4_9⟩. ⟨hal-01398013⟩
112 View
98 Download



Gmail Facebook X LinkedIn More