Results 11 to 20 of about 834,303 (333)

Directed Security Policies: A Stateful Network Implementation [PDF]

open access: yesElectronic Proceedings in Theoretical Computer Science, 2014
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Cornelius Diekmann   +2 more
doaj   +4 more sources

Unification of Information Security Policies for Network Security Solutions

open access: yesБезопасность информационных технологий, 2012
Diversity of command languages on network security solutions’ (NSS) interfaces causes problems in a process of information security policy (ISP) deployment.
D.S. Chernyavskiy
doaj   +1 more source

Exploring Security Enhancements in Kubernetes CNI: A Deep Dive Into Network Policies

open access: goldIEEE Access
With the explosive growth of Kubernetes adoption, Container Network Interfaces (CNIs) have become critical components for configuring and securing container networks, but a comprehensive analysis of their security capabilities and performance impact is ...
Bom Kim, Jinwoo Kim, Seungsoo Lee
doaj   +2 more sources

Standardizing IoT Network Security Policy Enforcement

open access: yesProceedings 2018 Workshop on Decentralized IoT Security and Standards, 2018
David Barrera, Ian Molloy, Heqing Huang
openaire   +3 more sources

An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement

open access: greenIEEE Communications Magazine, 2017
Claas Lorenz   +8 more
openalex   +3 more sources

Kunerva: Automated Network Policy Discovery Framework for Containers

open access: yesIEEE Access, 2023
Containerization has gained significant popularity in cloud-native applications, offering lightweight and portable capabilities, with container orchestration platforms such as Kubernetes, simplifying deployment and management.
Seungsoo Lee, Jaehyun Nam
doaj   +1 more source

Network Security Policy for Higher Education Institutions based on ISO Standards

open access: yesMediterranean Journal of Basic and Applied Sciences, 2021
Computer network plays a very important role in any organizations or institutions. It becomes a necessary tool, useful for communications, and can be utilized in storing data in various forms and at various locations. However, it intrinsically at risk to
Jonard B. Bolanio   +3 more
semanticscholar   +1 more source

IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery

open access: yesNetwork and Distributed System Security Symposium, 2021
—The Internet of Things (IoT) platforms bring significant convenience for increased home automation. Especially, these platforms provide many new features for managing multiple IoT devices to control their physical surroundings.
Wenbo Ding, Hongxin Hu, Long Cheng
semanticscholar   +1 more source

A Novel Administration Model for Managing and Organising the Heterogeneous Information Security Policy Field

open access: yesApplied Sciences, 2023
Information security policy (ISP) plays a crucial role in maintaining the availability, confidentiality, and integrity of sensitive data. However, it is of high complexity and heterogeneity due to the variety and redundancy of security policy practices ...
Fahad Mazaed Alotaibi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy