Results 261 to 270 of about 834,303 (333)
Some of the next articles are maybe not open access.

An Automata-based Security Policy Translation for Network Security Functions

2018 International Conference on Information and Communication Technology Convergence (ICTC), 2018
This paper proposes the design of a security policy translator in Interface to Network Security Functions (I2NSF) framework. Also, this paper shows the benefits of designing security policy translations. I2NSF is an architecture for providing various Network Security Functions (NSFs) to users.
Jinhyuk Yang, Jaehoon Paul Jeong
openaire   +2 more sources

Design of network security policy information model for policy-based network management

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005
An extensive network and a large variety of users may cause network security problems. So, the research of a network security has being progressed. In this paper, we present network security policy information model (NSPIM) to apply in policy-based network management systems.
null Scon-gyoung Sohn   +2 more
openaire   +2 more sources

Security Framework for Home Network: Authentication, Authorization, and Security Policy

PAKDD Workshops, 2007
As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping ...
Geon Woo Kim   +4 more
openaire   +2 more sources

MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy

ACM Symposium on Access Control Models and Technologies, 2023
Commercially-available software defined networking (SDN) technologies will play an important role in protecting the on-premises resources that remain as enterprises transition to zero trust architectures.
Iffat Anjum   +7 more
semanticscholar   +1 more source

A Firewall Policy Anomaly Detection Framework for Reliable Network Security

IEEE Transactions on Reliability, 2021
One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls.
Cengiz Toğay   +3 more
semanticscholar   +1 more source

Intent-Driven Security Policy Management for Software-Defined Systems

IEEE Transactions on Network and Service Management, 2022
Different network controllers are utilized in a multi-domain software-defined systems (SDx) to manage the networking resources. However, these controllers operate using a different high-level language (intent).
Ankur Chowdhary   +3 more
semanticscholar   +1 more source

A model of capabilities of Network Security Functions

IEEE Conference on Network Softwarization, 2022
This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks.
C. Basile   +4 more
semanticscholar   +1 more source

NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY*

The Journal of Industrial Economics, 2010
Software security is a major concern for vendors, consumers and regulators. When vulnerabilities are discovered after the software has been sold to consumers, the firms face a dilemma. A policy of disclosing vulnerabilities and issuing updates protects only consumers who install updates, while the disclosure itself facilitates reverse engineering of ...
Choi, Jay-Pil   +2 more
openaire   +2 more sources

Using security policies in a network securing process

2011 18th International Conference on Telecommunications, 2011
A security policy constitutes one of the major actors in the protection of communication networks but can be one of their drawbacks too. This can be the case if it is inadequate to the security requirements for example. For this, a security policy has to be checked before its real deployment.
Ryma Abassi, Sihem Guemara El Fatmi
openaire   +1 more source

Security policy specification for home network

International Journal of Ad Hoc and Ubiquitous Computing, 2009
As home network is expanding into ubiquitous computing environment and numerous home network services are available, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of internet, involving hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since
Geon Woo Kim   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy