Results 271 to 280 of about 834,303 (333)
Some of the next articles are maybe not open access.
Social Networks Security Policies
2016Social networks present useful tools for communication and information sharing. While these networks have a considerable impact on users daily life, security issues are various such as privacy defects, threats on publishing personal information, spammers and fraudsters.
Zeineb Dhouioui +2 more
openaire +1 more source
Automatic analysis of security policies in industrial networks
2010 IEEE International Workshop on Factory Communication Systems Proceedings, 2010The protection of ICT systems is a topic whose importance has been dramatically growing in the last years. In fact, their increased interconnection, both internal and through the Internet, besides having provided higher and inexpensive flexibility (e.g.
M Cheminod +3 more
openaire +2 more sources
Implementing a Security Policy Management for 5G Customer Edge Nodes
IEEE/IFIP Network Operations and Management Symposium, 2020The upcoming 5th generation (5G) mobile networks need to support ultra-reliable communication for business and life-critical applications. To do that 5G must offer higher degree of reliability than the current Internet, where networks are often subjected
Hammad Kabir, M. Mohsin, R. Kantola
semanticscholar +1 more source
Security policy decision for automation of security network configuration
9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732), 2004IETF has proposed a policy framework called policy-based network management (PBNM). Its best point is to provide automation of network configuration. Currently network area is actively embodying PBNM for QoS provisioning, RSVP admission control, device configuration, and etc. However, security area is not greatly interest in PBNM except IPSec.
null Gaeil Ahn +3 more
openaire +1 more source
Network security project management: a security policy-based approach
2007 IEEE International Conference on Systems, Man and Cybernetics, 2007Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic representation of security policies. This methodology is used within the SECOMO model. Two models are defined: the a priori model and the a posteriori model.
Jihene Krichene, Noureddine Boudriga
openaire +1 more source
Information Security Policies for Networkable Devices
2007Recent years have seen a surge in the introduction of networkable Windows-based operating system (NWOS) devices. Some examples are home entertainment systems (e.g., Xbox), smart phones (e.g., Motorola i930 and PlamOne’s Treo), and Pocket PC (e.g., Toshiba e850). While NWOS devices present an appealing proposition for both software vendors and buyers in
Kotlarsky, , Oshri, I (Ilan), Hirsch, C
openaire +2 more sources
Security policy transition framework for Software Defined networks
2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016Controllers for software defined networks (SDNs) are quickly maturing to offer network operators more intuitive programming frameworks and greater abstractions for network application development. Likewise, many security solutions now exist within SDN environments for detecting and blocking clients who violate network policies.
Jacob H. Cox +2 more
openaire +1 more source
Security Policy Violations in SDN Data Plane
IEEE/ACM Transactions on Networking, 2018Software-defined networking (SDN) utilizes a centralized controller to distribute packet processing rules to network switches. However, rules are often generated by the applications developed by different organizations, so they may conflict with each ...
Qi Li +4 more
semanticscholar +1 more source
Reliable security policy in mobile distributed network
2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016In this proposed paper, trusted policy based routing algorithm(TSPRA) is implemented for high security in Mobile Distributed Networks due to unreliability in storing the data and provides the solution to the problems of traditional authorization techniques. Here, Every Mobile Host (MH) has an Access Control Policy (ACP) with any specific combination of
D Bhuvana Suganthi +2 more
openaire +1 more source
Taxonomy of conflicts in network security policies
IEEE Communications Magazine, 2006Network security polices are essential elements in Internet security devices that provide traffic filtering, integrity, confidentiality, and authentication. Network security perimeter devices such as firewalls, IPSec, and IDS/IPS devices operate based on locally configured policies.
H. Hamed, E. Al-Shaer
openaire +1 more source

