Reasoning about Secure Interoperation using Soft Constraints. Bistarelli, S., Foley, S. N., & Barry, O. 2005.
doi  abstract   bibtex   
The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.
@conference{
	11391_142855,
	author = {Bistarelli, Stefano and Foley, SIMON N. and Barry, Osullivan},
	title = {Reasoning about Secure Interoperation using Soft Constraints},
	year = {2005},
	publisher = {Springer},
	volume = {173},
	booktitle = {Formal Aspects in Security and Trust},
	abstract = {The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.},
	doi = {10.1007/0-387-24098-5_13},	
	pages = {173--186}
}

Downloads: 0