A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model

被引:0
作者
Bera, P. [1 ]
Maity, Soumya [1 ]
Ghosh, S. K. [1 ]
Dasgupta, Pallab [2 ]
机构
[1] Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Comp Sci & Engn, Kharagpur 721302, W Bengal, India
来源
RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS | 2010年 / 89卷
关键词
WLAN Security; Security Policy; STRBAC model; Formal verification; ACCESS-CONTROL MODEL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread proliferation of wireless networks (WLAN) demands formal evaluation and analysis of security policy management in enterprise networks. The enforcement of organizational security policies in wireless local area networks (WLA.Ns) requires protection over the network resources from unauthorized access. Hence it is required to ensure correct distribution of access control rules to the network access points conforming to the security policy. In WLAN security policy management, the role-based access control (RBAC) mechanisms can be deployed to strengthen the security perimeter over the network resources. Further, there is a need to model the time and location dependent access constraints. In this paper, we propose WLAN security management system supported by a spatio-temporal RBAC (STRBAC) model and a SAT based verification framework. The system stems from logical partitioning of the WLAN topology into various security policy zones. It includes a Global Policy Server (CPS) that formalizes the organizational access policies and determines the high level policy configurations; a Central Authentication & Role Server (CARS) which authenticates the users and the access points (AP) in various zones and also assigns appropriate roles to the users. Each policy zone consists of an Wireless Policy Zone Controller (WPZCon) that co-ordinates with a dedicated Local Role Server (LRS) to extract the low level access configurations corresponding to the zone access router. We also propose a formal spatio-temporal RBAC (STRBAC) model to represent the global security policies formally and a SAT based verification framework to verify the access configurations.
引用
收藏
页码:232 / +
页数:3
相关论文
共 14 条
[1]   POSITIF: a policy-based security management system [J].
Basile, Cataldo ;
Lioy, Antonio ;
Perez, Gregorio Martinez ;
Garcia Clemente, Felix J. ;
Skarmeta, Antonio F. Gomez .
EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, :280-280
[2]  
Bera P., 2010, P 4 IH INT C INF SYS, P76
[3]  
Bhagyavati, 2004, P 1 INT C INF SEC CU, P82
[4]   Detecting independently moving objects and their interactions in georeferenced airborne video [J].
Burns, JB .
IEEE WORKSHOP ON DETECTION AND RECOGNITION OF EVENTS IN VIDEO, PROCEEDINGS, 2001, :12-19
[5]  
FERRAIOLO DF, 2001, ACM T INFORM SYSTEMS, V4
[6]  
HOFMEISTER T, 2002, LECT NOTES COMPUTER, V2285, P192
[7]   A generalized temporal role-based access control model [J].
Joshi, JBD ;
Bertino, E ;
Latif, U ;
Ghafoor, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) :4-23
[8]   A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies [J].
Laborde, R. ;
Nasser, B. ;
Grasset, F. ;
Barrere, F. ;
Benzekri, A. .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 121 :117-142
[9]  
LAPIOTIS G, 2005, INT WORKSH SEC PRIV, P181
[10]  
Mahajan YS, 2005, LECT NOTES COMPUT SC, V3542, P360