Date Added: Jun 2009
A Security Policy constitutes the core of network protection infrastructure. Thus, its development is a sensitive task because it can appears in opposition with some security requirements. A validation process for security policies becomes then necessary before their deployment. Nowadays, there is no automated tool in the network security world allowing such task. However, one has found that the theory developed in the software engineering domain to validate software projects can be adapted in the case because several similarities exist between the expressions of the needs in the two domains.