Results 251 to 260 of about 834,303 (333)
History and Current Status of the HIV/AIDS Supporting Network System. [PDF]
Cho S, Kim K, Han S, Hyun J, Yu J.
europepmc +1 more source
A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics. [PDF]
Patil DA, G S.
europepmc +1 more source
Challenges and experiences in digital health equity: a qualitative exploration of the implementation of the Health Code system in China. [PDF]
Dong J +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Network Security Policy Automation
Research Anthology on Cross-Disciplinary Designs and Applications of Automation, 2018Network security policy automation enables enterprise security teams to keep pace with increasingly dynamic changes in on-premises and public/hybrid cloud environments. This chapter discusses the most common use cases for policy automation in the enterprise, and new automation methodologies to address them by taking the reader step-by-step through ...
Myo Zarny, Meng Xu, Yi Sun
openaire +2 more sources
Assessment of Network Security Policy Based on Security Capability
2008 International Conference on Computer Science and Software Engineering, 2008The validity of the security policy has important impacts on the safety performance of network information system. For purpose of verifying it effectively, an assessment model of network security policy based on security capability is proposed. The relationship of defense methods, application targets, and information security attribute characteristics ...
null Chenghua Tang, null Shunzheng Yu
openaire +2 more sources
Network security policy models
AUSCRYPT, 2006This paper considers the development of security policy models for networks which can operate in a multilevel security environment. We outline an abstract security policy model which addresses the access control and information flow requirements in a multilevel network.
V. Varadharajan
openaire +2 more sources
Efficient Network Security Policy Enforcement With Policy Space Analysis
IEEE/ACM Transactions on Networking, 2016Network operators rely on security services to protect their IT infrastructures. Different kinds of network security policies are defined globally and distributed among multiple security middleboxes deployed in networks. However, due to the complexity of security policy, it is inefficient to directly employ existing path-wise enforcement approaches ...
Xiang Wang +3 more
openaire +2 more sources

