Results 1 to 10 of about 58,524 (307)

Directed Security Policies: A Stateful Network Implementation [PDF]

open access: diamondElectronic Proceedings in Theoretical Computer Science, 2014
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Cornelius Diekmann   +2 more
doaj   +7 more sources

Formal security policy implementations in network firewalls [PDF]

open access: greenComputers & Security, 2012
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper
Lu Fan   +5 more
openaire   +4 more sources

On Optimizing Compatible Security Policies in Wireless Networks [PDF]

open access: goldEURASIP Journal on Wireless Communications and Networking, 2006
This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible security policy and its relationship to the problem of maximum acyclic subgraph, which is proved to be NP-hard.
Huang, Scott C-H   +2 more
openaire   +5 more sources

Paradiplomacy, Security Policies and City Networks: the Case of the Mercocities Citizen Security Thematic Unit [PDF]

open access: diamondContexto Internacional, 2017
In a phenomenon known as paradiplomacy, cities are playing an increasingly important role in international relations. Through paradiplomacy, cities are co-operating internationally with other cities, and city networks have become important spaces for ...
Gilberto Marcos Antonio Rodrigues   +1 more
doaj   +2 more sources

Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking [PDF]

open access: yesInformation, 2017
In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets.
Woosik Lee, Namgi Kim
doaj   +3 more sources

Policy based security architecture for software defined networks [PDF]

open access: greenProceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
As networks expand in size and complexity, they pose greater administrative and management challenges. Software Defined Networks (SDN) offer a promising approach to meeting some of these challenges. In this paper, we propose a policy driven security architecture for securing end to end services across multiple SDN domains.
Vijay Varadharajan   +3 more
openaire   +6 more sources

Network Security Policy

open access: hybridModern Applied Science, 2010
The development of the Internet makes the rapid economy development of the whole society. Many enterprises form their own networks and connect to the Internet, in order to fully realize the sharing and use of data resources. With the development of the network, network security has become a growing concern in all sectors.
Lihua Han
openaire   +5 more sources

Exploring Security Enhancements in Kubernetes CNI: A Deep Dive Into Network Policies

open access: goldIEEE Access
With the explosive growth of Kubernetes adoption, Container Network Interfaces (CNIs) have become critical components for configuring and securing container networks, but a comprehensive analysis of their security capabilities and performance impact is ...
Bom Kim, Jinwoo Kim, Seungsoo Lee
doaj   +2 more sources

Kunerva: Automated Network Policy Discovery Framework for Containers

open access: yesIEEE Access, 2023
Containerization has gained significant popularity in cloud-native applications, offering lightweight and portable capabilities, with container orchestration platforms such as Kubernetes, simplifying deployment and management.
Seungsoo Lee, Jaehyun Nam
doaj   +1 more source

Balancing European Security Governance: Policy Networks and Correlates of Deliberate Harm [PDF]

open access: yesФилософия и космология, 2022
The proposed study reveals the features of the pressure from policy networks on the safety and security governance of states and intergovernmental organizations.
Kostyantyn Zakharenko, Hanna Strohanova
doaj   +1 more source

Home - About - Disclaimer - Privacy