Sciweavers

IFIP
2004
Springer

Reasoning about Secure Interoperation Using Soft Constraints

14 years 5 months ago
Reasoning about Secure Interoperation Using Soft Constraints
Abstract The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.
Stefano Bistarelli, Simon N. Foley, Barry O'Sulliv
Added 02 Jul 2010
Updated 02 Jul 2010
Type Conference
Year 2004
Where IFIP
Authors Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
Comments (0)