The Study on Network Security based on Software Engineering

被引:0
作者
Jia Shande [1 ]
Ao Qian [1 ]
机构
[1] ShangRao Normal Univ, Shangrao 334000, Jiangxi, Peoples R China
来源
FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012) | 2012年 / 8334卷
关键词
network security; software engineering; executable specification;
D O I
10.1117/12.954159
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Developing a SP is a sensitive task because the SP itself can lead to security weaknesses if it is not conform to the security properties. Hence, appropriate techniques are necessary to overcome such problems. These techniques must accompany the policy throughout its deployment phases. The main contribution of this paper is then, the proposition of three of these activities: validation, test and multi-SP conflict management. Our techniques are inspired by the well established techniques of the software engineering for which we have found some similarities with the security domain.
引用
收藏
页数:7
相关论文
共 8 条
[1]   An Automated Validation Method for Security Policies: the firewall case [J].
Abassi, Ryma ;
El Fatmi, Sihem Guemara .
FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, :291-294
[2]  
Abbassi R., 2009, INT J WIRELESS MOBIL, V1
[3]  
Fraser B., 1997, Site Security Handbook
[4]  
Holzmann GJ, 1991, DESIGN VALIDATION CO
[5]   TGV: Theory, principles and algorithms. A tool for the automatic synthesis of conformance test cases for non-deterministic reactive systems [J].
Jard C. ;
Jéron T. .
International Journal on Software Tools for Technology Transfer, 2005, 7 (4) :297-315
[6]  
Lindsay P. A., 1997, 9705 SOFTW VER RES C
[7]   PROVING LIVENESS PROPERTIES OF CONCURRENT PROGRAMS [J].
OWICKI, S ;
LAMPORT, L .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1982, 4 (03) :455-495
[8]  
[No title captured]