Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/108423
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ranathunga, D. | - |
dc.contributor.author | Roughan, M. | - |
dc.contributor.author | Kernick, P. | - |
dc.contributor.author | Falkner, N. | - |
dc.contributor.author | Nguyen, H. | - |
dc.contributor.author | McClintock, M. | - |
dc.contributor.author | Mihailescu, M. | - |
dc.contributor.editor | Callegari, C. | - |
dc.contributor.editor | VanSinderen, M. | - |
dc.contributor.editor | Sarigiannidis, P. | - |
dc.contributor.editor | Samarati, P. | - |
dc.contributor.editor | Cabello, E. | - |
dc.contributor.editor | Lorenz, P. | - |
dc.contributor.editor | Obaidat, M.S. | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016 / Callegari, C., VanSinderen, M., Sarigiannidis, P., Samarati, P., Cabello, E., Lorenz, P., Obaidat, M.S. (ed./s), vol.4, pp.344-351 | - |
dc.identifier.isbn | 9789897581960 | - |
dc.identifier.uri | http://hdl.handle.net/2440/108423 | - |
dc.description.abstract | A common goal in network-management is security. Reliable security requires confidence in the level of protection provided. But, many obstacles hinder reliable security management; most prominent is the lack of built-in verifiability in existing management paradigms. This shortfall makes it difficult to provide assurance that the expected security outcome is consistent pre- and post-deployment. Our research tackles the problem from first principles: we identify the verifiability requirements of robust security management, evaluate the limitations of existing paradigms and propose a new paradigm with verifi- ability built in: Formally-Verifiable Policy-Defined Networking (FV-PDN). In particular, we pay attention to firewalls which protect network data and resources from unauthorised access. We show how FV-PDN can be used to configure firewalls reliably in mission critical networks to protect them from cyber attacks. | - |
dc.description.statementofresponsibility | Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung Nguyen, Marian Mihailescu, Michelle McClintock | - |
dc.language.iso | en | - |
dc.publisher | SCITEPRESS | - |
dc.rights | Copyright © 2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved | - |
dc.source.uri | http://dx.doi.org/10.5220/0005990303440351 | - |
dc.subject | Security policy; Zone-Conduit model; SCADA security; Security management. | - |
dc.title | Verifiable policy-defined networking for security management | - |
dc.type | Conference paper | - |
dc.contributor.conference | 13th International Joint Conference on e-Business and Telecommunications (ICETE) (26 Jul 2016 - 28 Jul 2016 : Lisbon, Portugal) | - |
dc.identifier.doi | 10.5220/0005990303440351 | - |
dc.relation.grant | http://purl.org/au-research/grants/arc/LP100200493 | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Ranathunga, D. [0000-0002-8665-371X] | - |
dc.identifier.orcid | Roughan, M. [0000-0002-7882-7329] | - |
dc.identifier.orcid | Falkner, N. [0000-0001-7892-6813] | - |
dc.identifier.orcid | Nguyen, H. [0000-0003-1028-920X] | - |
Appears in Collections: | Aurora harvest 8 Mathematical Sciences publications |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
RA_hdl_108423.pdf Restricted Access | Restricted Access | 158.4 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.