Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/108423
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRanathunga, D.-
dc.contributor.authorRoughan, M.-
dc.contributor.authorKernick, P.-
dc.contributor.authorFalkner, N.-
dc.contributor.authorNguyen, H.-
dc.contributor.authorMcClintock, M.-
dc.contributor.authorMihailescu, M.-
dc.contributor.editorCallegari, C.-
dc.contributor.editorVanSinderen, M.-
dc.contributor.editorSarigiannidis, P.-
dc.contributor.editorSamarati, P.-
dc.contributor.editorCabello, E.-
dc.contributor.editorLorenz, P.-
dc.contributor.editorObaidat, M.S.-
dc.date.issued2016-
dc.identifier.citationProceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016 / Callegari, C., VanSinderen, M., Sarigiannidis, P., Samarati, P., Cabello, E., Lorenz, P., Obaidat, M.S. (ed./s), vol.4, pp.344-351-
dc.identifier.isbn9789897581960-
dc.identifier.urihttp://hdl.handle.net/2440/108423-
dc.description.abstractA common goal in network-management is security. Reliable security requires confidence in the level of protection provided. But, many obstacles hinder reliable security management; most prominent is the lack of built-in verifiability in existing management paradigms. This shortfall makes it difficult to provide assurance that the expected security outcome is consistent pre- and post-deployment. Our research tackles the problem from first principles: we identify the verifiability requirements of robust security management, evaluate the limitations of existing paradigms and propose a new paradigm with verifi- ability built in: Formally-Verifiable Policy-Defined Networking (FV-PDN). In particular, we pay attention to firewalls which protect network data and resources from unauthorised access. We show how FV-PDN can be used to configure firewalls reliably in mission critical networks to protect them from cyber attacks.-
dc.description.statementofresponsibilityDinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung Nguyen, Marian Mihailescu, Michelle McClintock-
dc.language.isoen-
dc.publisherSCITEPRESS-
dc.rightsCopyright © 2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved-
dc.source.urihttp://dx.doi.org/10.5220/0005990303440351-
dc.subjectSecurity policy; Zone-Conduit model; SCADA security; Security management.-
dc.titleVerifiable policy-defined networking for security management-
dc.typeConference paper-
dc.contributor.conference13th International Joint Conference on e-Business and Telecommunications (ICETE) (26 Jul 2016 - 28 Jul 2016 : Lisbon, Portugal)-
dc.identifier.doi10.5220/0005990303440351-
dc.relation.granthttp://purl.org/au-research/grants/arc/LP100200493-
pubs.publication-statusPublished-
dc.identifier.orcidRanathunga, D. [0000-0002-8665-371X]-
dc.identifier.orcidRoughan, M. [0000-0002-7882-7329]-
dc.identifier.orcidFalkner, N. [0000-0001-7892-6813]-
dc.identifier.orcidNguyen, H. [0000-0003-1028-920X]-
Appears in Collections:Aurora harvest 8
Mathematical Sciences publications

Files in This Item:
File Description SizeFormat 
RA_hdl_108423.pdf
  Restricted Access
Restricted Access158.4 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.