|
This article is cited in 2 scientific papers (total in 2 papers)
Conflict
Detection and Resolution in Security Policies of Computer Networks
A.V. Tishkov, I.V. Kotenko, O.V. Chervatuk, D.P. Lakomov, S.A. Reznick, E.V. Sidelnikova
Abstract:
We consider an approach for constructing the security policy verification system intended
for detection and resolution of conflicts in computer network security policy specifications. The architecture
of the security policy verification system suggested is considered. The models of two verification
modules are proposed. The first one is based on proof theory, namely Event Calculus, and uses
abductive reasoning. The second module uses model checking technique. The current implementation
of the security policy verification system is described.
Citation:
A.V. Tishkov, I.V. Kotenko, O.V. Chervatuk, D.P. Lakomov, S.A. Reznick, E.V. Sidelnikova, “Conflict
Detection and Resolution in Security Policies of Computer Networks”, Tr. SPIIRAN, 3:2 (2006), 102–114
Linking options:
https://www.mathnet.ru/eng/trspy237 https://www.mathnet.ru/eng/trspy/v3/i2/p102
|
Statistics & downloads: |
Abstract page: | 156 | Full-text PDF : | 53 | First page: | 1 |
|