Advertisement

Security Analysis and Configuration of Large Networks

  • Antonio Lioy

Abstract

Providing and managing security for large networked systems is difficult because their size and complexity makes manual design and management nearly impossible. Current security management tools lack functionality and mostly work only in mono-vendor environments. The POSITIF project has developed an open framework (and related tools) to support the design and management of security architectures, based on formal methods to describe a network system and the security requirements. The framework is easily expandable and can interface with limited effort to several open-source or proprietary security technologies and tools.

Keywords

Security Policy Security Requirement Security Analysis Generic Configuration Virtual Topology 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    “POSITIF — Policy—based Security Tools and Framework”, http://www.positif.org
  2. [2]
    Distributed Management Task Force (DMTF), “Common Information Model (CIM) standards”, http://www.dmtf.org/standards/ciml
  3. [3]
    U. Payer, S. Kraxberger, “SOM-Based Lightweight Policy Verification”, Terena Networking Conference, Catania (Italy), 15-18 May 2006Google Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden 2006

Authors and Affiliations

  • Antonio Lioy

There are no affiliations available

Personalised recommendations