SYSTEM AND METHOD FOR SECURITY PLANNING WITH HARD SECURITY CONSTRAINTS
First Claim
Patent Images
1. A method for security planning with hard security constraints, comprising:
- receiving security-related requirements of a network to be developed using system inputs and processing components; and
generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for security planning with hard security constraints includes: receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints.
-
Citations
21 Claims
-
1. A method for security planning with hard security constraints, comprising:
-
receiving security-related requirements of a network to be developed using system inputs and processing components; and generating the network according to the security-related requirements, wherein the network satisfies hard security constraints. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for security planning with access control policies, comprising:
-
receiving descriptions of available external inputs and processing components; receiving first security-related requirements of a first network to be developed using the available external inputs and processing components; and generating the first network according to the security-related requirements, wherein the first network satisfies access control policies. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer program product comprising a computer useable medium having computer program logic recorded thereon for security planning with hard security constraints, the computer program logic comprising:
-
program code for receiving security-related requirements of a network to be developed using system inputs and processing components; and program code for generating the network according to the security-related requirements, wherein the network satisfies hard security constraints. - View Dependent Claims (16, 17)
-
-
18. A computer program product comprising a computer useable medium having computer program logic recorded thereon for security planning with access control policies, the computer program logic comprising:
-
program code for receiving descriptions of available external inputs and processing components; program code for receiving first security-related requirements of a first network to be developed using the available external inputs and processing components; and program code for generating the first network according to the security-related requirements, wherein the first network satisfies access control policies. - View Dependent Claims (19, 20, 21)
-
Specification