2006
DOI: 10.1007/11754008_22
|View full text |Cite
|
Sign up to set email alerts
|

Test Generation for Network Security Rules

Abstract: Abstract. Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Although this is a kind of conformance testing, there are a number of significant differences with the framework of such standards as IS9646. We propose a method to derive tests from a policy expressed as a set of rules, with a single modality. For each element of our language and each type of rule, we propose a pattern of test, which we call a tile. We then combine those tiles into a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
1

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 21 publications
(19 citation statements)
references
References 8 publications
0
18
0
1
Order By: Relevance
“…For such services, naturally subject to malicious attacks, methods to certify their security are crucial. In this context there has been many research to develop formal methods for the design of secure systems and a growing interest in the formal verification of security properties [3,15,19] and in their model-based testing [8,11,17,18,23]. This line of research therefore complete at the computational level the large amount of work on cryptography and cryptographic protocols.…”
Section: Introductionmentioning
confidence: 99%
“…For such services, naturally subject to malicious attacks, methods to certify their security are crucial. In this context there has been many research to develop formal methods for the design of secure systems and a growing interest in the formal verification of security properties [3,15,19] and in their model-based testing [8,11,17,18,23]. This line of research therefore complete at the computational level the large amount of work on cryptography and cryptographic protocols.…”
Section: Introductionmentioning
confidence: 99%
“…For such services, naturally subject to malicious attacks, methods to certify their security are crucial. In this context there has been many research to develop formal methods for the design of secure systems and a growing interest in the formal verification of security properties [16,3,12] and in their model-based testing [20,15,6,14,10]. Security properties are generally divided into three categories: integrity, availability and confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…This works extends some preliminary descriptions on this technique [3,4] in several directions: first we try to demonstrate that it is general enough to support several logical formalisms, then we apply it for the well-known LTL temporal logic, and finally we evaluate it on a small case study using a prototype tool under development.…”
Section: Introductionmentioning
confidence: 80%