Automatic conformance checks of security policies is becoming a key issue in large ICT infrastructures that are more and more prone to cyber-attacks, in particular when wireless communication technologies and media are extensively adopted. This paper presents a hierarchical class-based model for the description of a system and its security requirements, that can be profitably used by a computer-aided analysis tool designed to carry out several kinds of policy verification. Our experience, gained in analyzing real systems, confirms that the structure and flexibility of the system description model are critical issues, together with the collection of real data needed to populate the model itself. The proposed solution is able to tolerate and overcome many of the practical limitations that are met when dealing with large and heterogeneous scenarios.

A Unified Class Model for Checking Security Policies in ICT Infrastructures

I Cibrario Bertolotti;L Durante;T Hu;A Valenzano
2012

Abstract

Automatic conformance checks of security policies is becoming a key issue in large ICT infrastructures that are more and more prone to cyber-attacks, in particular when wireless communication technologies and media are extensively adopted. This paper presents a hierarchical class-based model for the description of a system and its security requirements, that can be profitably used by a computer-aided analysis tool designed to carry out several kinds of policy verification. Our experience, gained in analyzing real systems, confirms that the structure and flexibility of the system description model are critical issues, together with the collection of real data needed to populate the model itself. The proposed solution is able to tolerate and overcome many of the practical limitations that are met when dealing with large and heterogeneous scenarios.
2012
Istituto di Elettronica e di Ingegneria dell'Informazione e delle Telecomunicazioni - IEIIT
Inglese
1st IEEE-AESS Conf. on Space and Satellite Telecommunications (ESTEL 2012)
6
978-1-4673-4687-0
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6400068
The Institute of Electrical and Electronics Engineers (IEEE)
Piscataway
STATI UNITI D'AMERICA
Sì, ma tipo non specificato
2-5 Ottobre 2012
Roma
data modelling
security policies
policy conformance check
wireless networks
4
none
CIBRARIO BERTOLOTTI, Ivan; Durante, L; Hu, T; Valenzano, A
273
info:eu-repo/semantics/conferenceObject
04 Contributo in convegno::04.01 Contributo in Atti di convegno
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/234008
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact