A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Reasoning about Secure Interoperation Using Soft Constraints
[chapter]
Formal Aspects in Security and Trust
The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.
doi:10.1007/0-387-24098-5_13
dblp:conf/ifip1-7/BistarelliFO04
fatcat:vlbt2shrnvg3pnw7mgtwymgplq