A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures

被引:16
作者
Casola, Valentina [1 ]
Mazzeo, Antonino [1 ]
Mazzocca, Nicola [1 ]
Vittorini, Valeria [1 ]
机构
[1] Univ Napoli Federico II, Dipartimento Informat & Sistemist, Via Claudio 21, I-80125 Naples, Italy
关键词
Security evaluation; Security Metric; Certificate Policies; Public Key Infrastructures;
D O I
10.3233/JCS-2007-15201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of complex infrastructures depends on many technical and organizational issues that need to be properly addressed by a security policy. For purpose of our discussion, we define a security policy as a document that states what is and what is not allowed in a system during normal operation; it consists of a set of rules that could be expressed in formal, semi-formal or very informal language. In many contexts, a system can be considered secure and trustworthy if the policy enforced by its security administrator is trustworthy too; from this standpoint it is possible to evaluate the system security by evaluating its policy. In this paper we present a policy-based methodology to formalize and compare policies, and a Security Metric to evaluate the security level that a system is able to grant. All the steps of the methodology will be illustrated with an operative approach, by directly applying it to a real case study: the semi-automated Cross Certification among Public Key Infrastructures.
引用
收藏
页码:197 / 229
页数:33
相关论文
共 33 条
[1]  
[Anonymous], 1999, DIGITAL SIGNATURE CO
[2]  
[Anonymous], 1999, 3647 RFC
[3]  
[Anonymous], LECT NOTES COMPUTER
[4]  
[Anonymous], HOME
[5]  
[Anonymous], 1999, 2459 RFC
[6]  
[Anonymous], OR BOOK RAINB SER
[7]  
[Anonymous], P 21 ANN COMP SEC AP
[8]  
Berkovits S., 1994, PUBLIC KEY INFRASTRU
[9]  
Bishop M.A., 2003, COMPUTER SECURITY AR
[10]  
Casola V., 2004, PARALLEL DISTRIBUTED