TY - GEN
T1 - Security policy pre-evaluation towards risk analysis
AU - Yi, Han
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2008
Y1 - 2008
N2 - Nowadays, security policy evaluation becomes a very hot topic since high QoP(Quality of Protection) is required by more and more people. Most of the researchers focus on the security policy evaluation after they have been enforced into real application systems via some real attacks. However, before security policy enforcement, the policy themselves may also contain some anomalies which shouldn't be ignored. In this paper, we pointed out the importance of security policy pre-evaluation which focuses on security , policy evaluation before policy enforcement. In addition we propose a framework for it towards risk analysis. As a concrete example, we show how to apply our framework to firewall security policies. Finally we discuss about the difficulty of our proposal and show future work interests.
AB - Nowadays, security policy evaluation becomes a very hot topic since high QoP(Quality of Protection) is required by more and more people. Most of the researchers focus on the security policy evaluation after they have been enforced into real application systems via some real attacks. However, before security policy enforcement, the policy themselves may also contain some anomalies which shouldn't be ignored. In this paper, we pointed out the importance of security policy pre-evaluation which focuses on security , policy evaluation before policy enforcement. In addition we propose a framework for it towards risk analysis. As a concrete example, we show how to apply our framework to firewall security policies. Finally we discuss about the difficulty of our proposal and show future work interests.
UR - http://www.scopus.com/inward/record.url?scp=51349136634&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=51349136634&partnerID=8YFLogxK
U2 - 10.1109/ISA.2008.114
DO - 10.1109/ISA.2008.114
M3 - Conference contribution
AN - SCOPUS:51349136634
SN - 9780769531267
T3 - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
SP - 415
EP - 420
BT - Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
T2 - 2nd International Conference on Information Security and Assurance, ISA 2008
Y2 - 24 April 2008 through 26 April 2008
ER -