Sciweavers

534 search results - page 1 / 107
» Aggregating and Deploying Network Access Control Policies
Sort
View
IEEEARES
2007
IEEE
13 years 11 months ago
Aggregating and Deploying Network Access Control Policies
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies — ...
Joaquín García-Alfaro, Fréd&e...
IFIP
2004
Springer
13 years 10 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
SIS
2008
13 years 6 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
SASO
2007
IEEE
13 years 11 months ago
Shruti: A Self-Tuning Hierarchical Aggregation System
Current aggregation systems either have a single inbuilt aggregation mechanism or require applications to specify an aggregation policy a priori. It is hard to predict the read an...
Praveen Yalagandula, Michael Dahlin
CCS
2009
ACM
14 years 5 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...