Article ID Journal Published Year Pages File Type
423551 Electronic Notes in Theoretical Computer Science 2009 21 Pages PDF
Abstract

The rewrite-based approach provides executable specifications for security policies, which can be independently designed, verified, and then anchored on programs using a modular discipline. In this paper, we describe how to perform queries over these rule-based policies in order to increase the trust of the policy author on the correct behavior of the policy. The analysis we provide is founded on the strategic narrowing process, which provides both the necessary abstraction for simulating executions of the policy over access requests and the mechanism for solving what-if queries from the security administrator. We illustrate this general approach by the analysis of a firewall system policy.

Related Topics
Physical Sciences and Engineering Computer Science Computational Theory and Mathematics