Results 261 to 270 of about 834,303 (333)
Some of the next articles are maybe not open access.
An Automata-based Security Policy Translation for Network Security Functions
2018 International Conference on Information and Communication Technology Convergence (ICTC), 2018This paper proposes the design of a security policy translator in Interface to Network Security Functions (I2NSF) framework. Also, this paper shows the benefits of designing security policy translations. I2NSF is an architecture for providing various Network Security Functions (NSFs) to users.
Jinhyuk Yang, Jaehoon Paul Jeong
openaire +2 more sources
Design of network security policy information model for policy-based network management
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005An extensive network and a large variety of users may cause network security problems. So, the research of a network security has being progressed. In this paper, we present network security policy information model (NSPIM) to apply in policy-based network management systems.
null Scon-gyoung Sohn +2 more
openaire +2 more sources
Security Framework for Home Network: Authentication, Authorization, and Security Policy
PAKDD Workshops, 2007As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping ...
Geon Woo Kim +4 more
openaire +2 more sources
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
ACM Symposium on Access Control Models and Technologies, 2023Commercially-available software defined networking (SDN) technologies will play an important role in protecting the on-premises resources that remain as enterprises transition to zero trust architectures.
Iffat Anjum +7 more
semanticscholar +1 more source
A Firewall Policy Anomaly Detection Framework for Reliable Network Security
IEEE Transactions on Reliability, 2021One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls.
Cengiz Toğay +3 more
semanticscholar +1 more source
Intent-Driven Security Policy Management for Software-Defined Systems
IEEE Transactions on Network and Service Management, 2022Different network controllers are utilized in a multi-domain software-defined systems (SDx) to manage the networking resources. However, these controllers operate using a different high-level language (intent).
Ankur Chowdhary +3 more
semanticscholar +1 more source
A model of capabilities of Network Security Functions
IEEE Conference on Network Softwarization, 2022This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks.
C. Basile +4 more
semanticscholar +1 more source
NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY*
The Journal of Industrial Economics, 2010Software security is a major concern for vendors, consumers and regulators. When vulnerabilities are discovered after the software has been sold to consumers, the firms face a dilemma. A policy of disclosing vulnerabilities and issuing updates protects only consumers who install updates, while the disclosure itself facilitates reverse engineering of ...
Choi, Jay-Pil +2 more
openaire +2 more sources
Using security policies in a network securing process
2011 18th International Conference on Telecommunications, 2011A security policy constitutes one of the major actors in the protection of communication networks but can be one of their drawbacks too. This can be the case if it is inadequate to the security requirements for example. For this, a security policy has to be checked before its real deployment.
Ryma Abassi, Sihem Guemara El Fatmi
openaire +1 more source
Security policy specification for home network
International Journal of Ad Hoc and Ubiquitous Computing, 2009As home network is expanding into ubiquitous computing environment and numerous home network services are available, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of internet, involving hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since
Geon Woo Kim +3 more
openaire +1 more source

