compliance verification
Recently Published Documents


TOTAL DOCUMENTS

72
(FIVE YEARS 5)

H-INDEX

7
(FIVE YEARS 0)

2021 ◽  
Author(s):  
Claas Lorenz ◽  
Vera Clemens ◽  
Max Schrötter ◽  
Bettina Schnor

Continuous verification of network security compliance is an accepted need. Especially, the analysis of stateful packet filters plays a central role for network security in practice. But the few existing tools which support the analysis of stateful packet filters show runtimes in the order of minutes to hours making them unsuitable for continuous compliance verification.<br>In this work, we address these challenges and present a solution which is based on the application of formal methods. First, we introduce the formal language FPL that enables a high-level human-understandable specification of the desired state of network security. Second, we demonstrate the instantiation of a compliance process using a verification framework that analyzes the configuration of complex networks and devices - including stateful firewalls - for compliance with FPL policies. Our evaluation results show the scalability of the presented approach for the well known Internet2 and Stanford benchmarks as well as for large firewall rule sets where it outscales state-of-the-art tools by a factor of over 41.


2021 ◽  
Author(s):  
Claas Lorenz ◽  
Vera Clemens ◽  
Max Schrötter ◽  
Bettina Schnor

Continuous verification of network security compliance is an accepted need. Especially, the analysis of stateful packet filters plays a central role for network security in practice. But the few existing tools which support the analysis of stateful packet filters show runtimes in the order of minutes to hours making them unsuitable for continuous compliance verification.<br>In this work, we address these challenges and present a solution which is based on the application of formal methods. First, we introduce the formal language FPL that enables a high-level human-understandable specification of the desired state of network security. Second, we demonstrate the instantiation of a compliance process using a verification framework that analyzes the configuration of complex networks and devices - including stateful firewalls - for compliance with FPL policies. Our evaluation results show the scalability of the presented approach for the well known Internet2 and Stanford benchmarks as well as for large firewall rule sets where it outscales state-of-the-art tools by a factor of over 41.


Author(s):  
Masoud Barati ◽  
Gagangeet Singh Aujla ◽  
Jose Tomas Llanos ◽  
Kwabena Adu Duodu ◽  
Omer F. Rana ◽  
...  

2021 ◽  
pp. 1-11
Author(s):  
Ani Bicaku ◽  
Mario Zsilak ◽  
Peter Theiler ◽  
Markus Tauber ◽  
Jerker Delsing

2020 ◽  
Vol 5 (3) ◽  
pp. 402
Author(s):  
Abdul Aziz ◽  
Hartono Hartono ◽  
Abdul Rohman ◽  
Danartomo Kusumoaji

The aircraft design is required to carry out the functions of the Design Organization Approval (DOA), in which there are several positions involved, namely Design Engineer (DE), Compliance Verification Engineer (CVE) and Airworthiness Officer (AWO). In the process, DE makes aircraft designs, CVE will correct the designs that have been made, and AWO will make corrections based on document writing standards. The current problem is that the document checking process takes a long time and requires excessive costs for the use of paper and ink. The solution to solve this problem is by building a web-based system. The system was built using the CodeIgniter framework and PostgreSQL as its database. As for the development of the system itself using the Prototype method. Through this system, the DOA function process will be faster and paperless.


2020 ◽  
Vol 16 (6) ◽  
pp. 155014772092273 ◽  
Author(s):  
Ani Bicaku ◽  
Markus Tauber ◽  
Jerker Delsing

Due to globalization and digitalization of industrial systems, standard compliance is gaining more attention. In order to stay competitive and remain in business, different sectors within industry are required to comply with multiple regulations. Compliance aims to fulfill regulations by including all measures imposed by laws and standards. Every device, application, or service implements several technologies at many levels, and standards support interoperability across them. They help to create global markets for industries and enable networked development in order to be successful and sustainable. This work highlights the importance of standard compliance and continuous verification in industrial Internet of Things and implements an automatic monitoring and standard compliance verification framework. In this work, we focus on security, safety, and organizational aspects of industrial Internet of Things. We identify a number of standards and best practice guidelines, which are used to extract security, safety, and organizational measurable indicator points. In addition, a metric model is provided that forms the basis for the necessary information needed for compliance verification, including requirements, standards, and metrics. Also, we present the prototype of the monitoring and standard compliance verification framework used to show the security compliance of an industrial Internet of Things use case.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 119697-119709
Author(s):  
Masoud Barati ◽  
Omer Rana ◽  
Ioan Petri ◽  
George Theodorakopoulos

Sign in / Sign up

Export Citation Format

Share Document