Sciweavers

61 search results - page 1 / 13
» Reliable Process for Security Policy Deployment
Sort
View
SECRYPT
2007
60views Business» more  SECRYPT 2007»
13 years 6 months ago
Reliable Process for Security Policy Deployment
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
IFIP
2004
Springer
13 years 10 months ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
BPSC
2009
184views Business» more  BPSC 2009»
13 years 6 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
IASTEDSE
2004
13 years 6 months ago
Security and reliability challenges in component-based software for consumer devices
Consumer devices have domain specific constraints imposed by end-users, device manufacturers and service providers. These constraints focus on the need for security and reliabilit...
Stefano Campadello, Ronan MacLaverty, Titos Sarida...
USENIX
2008
13 years 7 months ago
ConfiDNS: Leveraging Scale and History to Detect Compromise
While cooperative DNS resolver systems, such as CoDNS, have demonstrated improved reliability and performance over standard approaches, their security has been weaker, since any c...
Lindsey Poole, Vivek S. Pai