
arXiv: 1405.1114
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.
In Proceedings ESSS 2014, arXiv:1405.0554
FOS: Computer and information sciences, Computer Science - Logic in Computer Science, Computer Science - Cryptography and Security, C.2.1; C.2.3; D.4.6, QA75.5-76.95, D.4.6, Logic in Computer Science (cs.LO), C.2.3, C.2.1, Electronic computers. Computer science, QA1-939, Cryptography and Security (cs.CR), Mathematics
FOS: Computer and information sciences, Computer Science - Logic in Computer Science, Computer Science - Cryptography and Security, C.2.1; C.2.3; D.4.6, QA75.5-76.95, D.4.6, Logic in Computer Science (cs.LO), C.2.3, C.2.1, Electronic computers. Computer science, QA1-939, Cryptography and Security (cs.CR), Mathematics
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 4 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
