Open Access

A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms


Cite

BARTAL, Y.—MAYER, A.—NISSIM, K.—WOOL, A.: Firmato: a Novel Firewall Management Toolkit, IEEE Symposium on Security and Privacy, 1999, pp. 17-31.Search in Google Scholar

MAYER, A.—WOOL, A.—ZISKIND, E. Fang: a Firewall Analysis Engine : In Proc. of the IEEE Symposium on Security and Privacy, 2000.Search in Google Scholar

HASSAN, A.—HUDEC, L.: Role Based Network Security Model: A Forward Step Towards Firewall Management, In Workshop on Security of Information Technologies, Algiers, 2003.Search in Google Scholar

El KALAM, A. A.—El BAIDA, R.—BALBIANI, P.—BENFERHAT, S.—CUPPENS, F.—DESWARTE, Y.—MIEGE, A.—SAUREL, C.—TROUESSIN, G.: Organization Based Access Control, In Proc. of 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Come, Italy, June 2003, pp. 120-134.Search in Google Scholar

GHORBEL-TALBI, M.—CUPPENS, F.—CUPPENS, N.—BOULAHIA, A.: Managing Delegation in Access Control Models, 15th International Conference on Advanced Computing and Communication (ADCOM'07), Guwahati, Inde, December 2007.10.1109/ADCOM.2007.105Search in Google Scholar

MIEGE, A.: Definition of a Formal Framework for Specifying Security Policies. The Or-BAC Model and Extensions, PhD thesis, Ecole Nationale Superieure des Telecommunications, 2005.Search in Google Scholar

CUPPENS, F.—CUPPENS, N. SANS, T.—MIEGE, A.: A Formal Approach to Specify and Deploy a Network Security Policy, In Proc. of the 2nd Workshop on Formal Aspects in Security and Trust (FAST), Toulouse, France, August 2004.Search in Google Scholar

KANGASLUOMA, M.: Policy Specification Languages, Report of Helsinki University of Technology, Helsinki, Finland, November 1999.Search in Google Scholar

JOHNSON, M.—CHANG, P.—JEFFERS, R.—BRADSHAW, J. et al: KAoS Semantic Policy and Domain Services: an Application of DAML to Web Services-Based Grid Architectures, In Proc. of the AAMAS 03 Workshop on Web Services and Agent-Based Engineering, Melbourne, Australia, July 2003.10.1007/0-387-23344-X_6Search in Google Scholar

The Web Ontology Language (OWL) http://www.w3.org/TR/owl-ref/Search in Google Scholar

HOAGLAND, J. et al: Security Policy Specification Using a Graphical Approach, Technical Report CSE-98-3, University of California, Davis Department of Computer Science, 1998.Search in Google Scholar

BLAZE, M.—FEIGENBAUM, J.—IOANNIDIS, J.—KEROMYTIS, A. D.: In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer-Verlag, New York, NY, USA, 1999, pp. 185-210.10.1007/3-540-48749-2_8Search in Google Scholar

BLAZE, M.—FEIGENBAUM, J.—KEROMYTIS, A.: Keynote: Trust Management for Publc-Key Infrastructures, In Proc. of the Security Protocls International Workshop, Cambridge, England, Springer-Verlag LNCS, April 1998, pp. 59-63.10.1007/3-540-49135-X_9Search in Google Scholar

HINE, J.—YAO, W.—BACON, J.—MOODY, K.: An Architecture for Distributed OASIS Services, In Proc. of the Middleware 2000, New York, USA, Lecture Notes in Computer Science, Springer-Verlag, April 2000, pp. 107-123.10.1007/3-540-45559-0_6Search in Google Scholar

DAMIANOU, N.: A Policy Framework for Management of Distributed Systems, PhD thesis, University of London, 2002.Search in Google Scholar

LU, F.: Enforcing Ponder Policies using Kava, Master thesis, Victoria University of Wellington, 2004.Search in Google Scholar

ISSN:
1335-3632
Language:
English
Publication timeframe:
6 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other