Sciweavers

Share
JCP
2008

Formal Verification and Visualization of Security Policies

11 years 11 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes in the development, deployment, and maintenance of such systems. In this paper, we introduce an expert system that helps with the design and implementation of security policies. We show how Prolog is used to verify system correctness with respect to policies using a theorem prover. Managing and visualizing information in high assurance computer systems are challenging tasks. To simplify these tasks, we show how a graph-based visualization tool is used to validate policies and provide system security managers with a process that enables policy reviews and visualizes interactions between the system's entities. The tool provides not only a representation of the formal model, but also its execution. The introduced executable model is a formal specification and knowledge representation method.
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F
Added 13 Dec 2010
Updated 13 Dec 2010
Type Journal
Year 2008
Where JCP
Authors Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-Foss
Comments (0)
books