skip to main content
10.1145/2388576.2388579acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A concept of unification of network security policies

Authors Info & Claims
Published:25 October 2012Publication History

ABSTRACT

Security policy is a main mechanism of information security management. While there are a lot of security-related standards and guidelines which specify requirements for high-level security policies, implementation of network security policy still depends on interfaces provided by network security systems (NSS). Obviously, diversity of policy representation languages affects efficiency of policy deployment process. The paper proposes a concept of unification of policy rules for NSSs as a solution for the problem. The idea is based on a formal language which makes it possible to formalize network security policies independently of particular NSSs.

References

  1. ISO/IEC 27002:2005 Information technology -- Security techniques -- Code of practice for information security management.Google ScholarGoogle Scholar
  2. ISO/TR 13569:2005 Financial services -- Information security guidelines.Google ScholarGoogle Scholar
  3. ISO/IEC 15408--1:2009 Information technology -- Security techniques -- Evaluation criteria for IT security -- Part 1: Introduction and general model.Google ScholarGoogle Scholar
  4. M.A. Harrison. Introduction to formal language theory. Addison-Wesley Longman Publishing Company, Boston, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Chernyavskiy and N. Miloslavskaya. Unified Language for Network Security Policy Implementation. In The Seventh International Conference on Networking and Services, pages 136--140. IARIA, May 2011.Google ScholarGoogle Scholar
  6. RFC 791 Internet Protocol. DOI = http://www.ietf.org/rfc/rfc791.txt.Google ScholarGoogle Scholar
  7. RFC 793 Transmission Control Protocol, DOI = http://www.ietf.org/rfc/rfc793.txt.Google ScholarGoogle Scholar
  8. Check Point Management Interface API Specification. DOI = http://www.opsec.com/cp_products/opsec_sdk.html.Google ScholarGoogle Scholar
  9. C. Alm and M. Drouineaud. Analysis of Existing Policy Languages. Technical report, ORKA Consortium, June 2007.Google ScholarGoogle Scholar
  10. W. Zhou, Y. Mao, B. T. Loo and M. Abadi. Unified Declarative Platform for Secure Networked Information Systems. In IEEE 25th International Conference on Data Engineering, pages 150--161. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. T. Hinrichs, N. Gude, M. Casado, J. Mitchell and S. Shenker. Expressing and Enforcing Flow-Based Network Security Policies. Technical report, University of Chicago. 2009.Google ScholarGoogle Scholar
  12. A.A. Hassan and W. M. Bahgat. A Framework for Translating A High Level Security Policy into Low Level Security Mechanisms. Journal of Electrical Engineering, 61(1): 20--28, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  13. F. Cuppens, N. Cuppens-Boulahia, T. Sans and A. Miμege. A Formal Approach to Specify and Deploy a Network Security Policy. In Formal Aspects in Security and Trust, pages 203--218. 2004.Google ScholarGoogle Scholar
  14. D. Jiao, L. Liu, S. Ma, and X. Wang. Research on Security Policy and Framework. In The Second International Symposium on Networking and Network Security, pages 214--217. Academy Publisher, April 2010.Google ScholarGoogle Scholar

Index Terms

  1. A concept of unification of network security policies

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SIN '12: Proceedings of the Fifth International Conference on Security of Information and Networks
              October 2012
              226 pages
              ISBN:9781450316682
              DOI:10.1145/2388576

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 25 October 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              Overall Acceptance Rate102of289submissions,35%
            • Article Metrics

              • Downloads (Last 12 months)2
              • Downloads (Last 6 weeks)0

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader