Results 251 to 260 of about 834,303 (333)

History and Current Status of the HIV/AIDS Supporting Network System. [PDF]

open access: yesJugan Geongang Gwa Jilbyeong
Cho S, Kim K, Han S, Hyun J, Yu J.
europepmc   +1 more source

Network Security Policy Automation

Research Anthology on Cross-Disciplinary Designs and Applications of Automation, 2018
Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through ...
Myo Zarny, Meng Xu, Yi Sun
openaire   +2 more sources

Assessment of Network Security Policy Based on Security Capability

2008 International Conference on Computer Science and Software Engineering, 2008
The validity of the security policy has important impacts on the safety performance of network information system. For purpose of verifying it effectively, an assessment model of network security policy based on security capability is proposed. The relationship of defense methods, application targets, and information security attribute characteristics ...
null Chenghua Tang, null Shunzheng Yu
openaire   +2 more sources

Network security policy models

AUSCRYPT, 2006
This paper considers the development of security policy models for networks which can operate in a multilevel security environment. We outline an abstract security policy model which addresses the access control and information flow requirements in a multilevel network.
V. Varadharajan
openaire   +2 more sources

Efficient Network Security Policy Enforcement With Policy Space Analysis

IEEE/ACM Transactions on Networking, 2016
Network operators rely on security services to protect their IT infrastructures. Different kinds of network security policies are defined globally and distributed among multiple security middleboxes deployed in networks. However, due to the complexity of security policy, it is inefficient to directly employ existing path-wise enforcement approaches ...
Xiang Wang   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy