Reasoning about secureinteroperation using soft constraints

Research output: Chapter in Book/Report/Conference proceedingsChapterpeer-review

Abstract

The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.

Original languageEnglish
Title of host publicationFormal Aspects in Security and Trust - IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust and World Computer Congress, FAST 2004
PublisherSpringer New York LLC
Pages173-186
Number of pages14
ISBN (Print)0387240500, 9780387240503
DOIs
Publication statusPublished - 2005
EventIFIP TC1 WG1.7 2nd International Workshop on Formal Aspects in Security and Trust, FAST 2004 - Toulouse, France
Duration: 22 Aug 200427 Aug 2004

Publication series

NameIFIP Advances in Information and Communication Technology
Volume173
ISSN (Print)1868-4238

Conference

ConferenceIFIP TC1 WG1.7 2nd International Workshop on Formal Aspects in Security and Trust, FAST 2004
Country/TerritoryFrance
CityToulouse
Period22/08/0427/08/04

Fingerprint

Dive into the research topics of 'Reasoning about secureinteroperation using soft constraints'. Together they form a unique fingerprint.

Cite this