Results 11 to 20 of about 834,303 (333)
Directed Security Policies: A Stateful Network Implementation [PDF]
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Cornelius Diekmann +2 more
doaj +4 more sources
Unification of Information Security Policies for Network Security Solutions
Diversity of command languages on network security solutions’ (NSS) interfaces causes problems in a process of information security policy (ISP) deployment.
D.S. Chernyavskiy
doaj +1 more source
Exploring Security Enhancements in Kubernetes CNI: A Deep Dive Into Network Policies
With the explosive growth of Kubernetes adoption, Container Network Interfaces (CNIs) have become critical components for configuring and securing container networks, but a comprehensive analysis of their security capabilities and performance impact is ...
Bom Kim, Jinwoo Kim, Seungsoo Lee
doaj +2 more sources
Standardizing IoT Network Security Policy Enforcement
David Barrera, Ian Molloy, Heqing Huang
openaire +3 more sources
Security Policy Negotiation Model Design for Secure Network Management [PDF]
Jinho Park, Jinwook Chung
openalex +3 more sources
An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement
Claas Lorenz +8 more
openalex +3 more sources
Kunerva: Automated Network Policy Discovery Framework for Containers
Containerization has gained significant popularity in cloud-native applications, offering lightweight and portable capabilities, with container orchestration platforms such as Kubernetes, simplifying deployment and management.
Seungsoo Lee, Jaehyun Nam
doaj +1 more source
Network Security Policy for Higher Education Institutions based on ISO Standards
Computer network plays a very important role in any organizations or institutions. It becomes a necessary tool, useful for communications, and can be utilized in storing data in various forms and at various locations. However, it intrinsically at risk to
Jonard B. Bolanio +3 more
semanticscholar +1 more source
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery
—The Internet of Things (IoT) platforms bring significant convenience for increased home automation. Especially, these platforms provide many new features for managing multiple IoT devices to control their physical surroundings.
Wenbo Ding, Hongxin Hu, Long Cheng
semanticscholar +1 more source
Information security policy (ISP) plays a crucial role in maintaining the availability, confidentiality, and integrity of sensitive data. However, it is of high complexity and heterogeneity due to the variety and redundancy of security policy practices ...
Fahad Mazaed Alotaibi +3 more
doaj +1 more source

