Results 271 to 280 of about 834,303 (333)
Some of the next articles are maybe not open access.

Social Networks Security Policies

2016
Social networks present useful tools for communication and information sharing. While these networks have a considerable impact on users daily life, security issues are various such as privacy defects, threats on publishing personal information, spammers and fraudsters.
Zeineb Dhouioui   +2 more
openaire   +1 more source

Automatic analysis of security policies in industrial networks

2010 IEEE International Workshop on Factory Communication Systems Proceedings, 2010
The protection of ICT systems is a topic whose importance has been dramatically growing in the last years. In fact, their increased interconnection, both internal and through the Internet, besides having provided higher and inexpensive flexibility (e.g.
M Cheminod   +3 more
openaire   +2 more sources

Implementing a Security Policy Management for 5G Customer Edge Nodes

IEEE/IFIP Network Operations and Management Symposium, 2020
The upcoming 5th generation (5G) mobile networks need to support ultra-reliable communication for business and life-critical applications. To do that 5G must offer higher degree of reliability than the current Internet, where networks are often subjected
Hammad Kabir, M. Mohsin, R. Kantola
semanticscholar   +1 more source

Security policy decision for automation of security network configuration

9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732), 2004
IETF has proposed a policy framework called policy-based network management (PBNM). Its best point is to provide automation of network configuration. Currently network area is actively embodying PBNM for QoS provisioning, RSVP admission control, device configuration, and etc. However, security area is not greatly interest in PBNM except IPSec.
null Gaeil Ahn   +3 more
openaire   +1 more source

Network security project management: a security policy-based approach

2007 IEEE International Conference on Systems, Man and Cybernetics, 2007
Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic representation of security policies. This methodology is used within the SECOMO model. Two models are defined: the a priori model and the a posteriori model.
Jihene Krichene, Noureddine Boudriga
openaire   +1 more source

Information Security Policies for Networkable Devices

2007
Recent years have seen a surge in the introduction of networkable Windows-based operating system (NWOS) devices. Some examples are home entertainment systems (e.g., Xbox), smart phones (e.g., Motorola i930 and PlamOne’s Treo), and Pocket PC (e.g., Toshiba e850). While NWOS devices present an appealing proposition for both software vendors and buyers in
Kotlarsky, , Oshri, I (Ilan), Hirsch, C
openaire   +2 more sources

Security policy transition framework for Software Defined networks

2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016
Controllers for software defined networks (SDNs) are quickly maturing to offer network operators more intuitive programming frameworks and greater abstractions for network application development. Likewise, many security solutions now exist within SDN environments for detecting and blocking clients who violate network policies.
Jacob H. Cox   +2 more
openaire   +1 more source

Security Policy Violations in SDN Data Plane

IEEE/ACM Transactions on Networking, 2018
Software-defined networking (SDN) utilizes a centralized controller to distribute packet processing rules to network switches. However, rules are often generated by the applications developed by different organizations, so they may conflict with each ...
Qi Li   +4 more
semanticscholar   +1 more source

Reliable security policy in mobile distributed network

2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016
In this proposed paper, trusted policy based routing algorithm(TSPRA) is implemented for high security in Mobile Distributed Networks due to unreliability in storing the data and provides the solution to the problems of traditional authorization techniques. Here, Every Mobile Host (MH) has an Access Control Policy (ACP) with any specific combination of
D Bhuvana Suganthi   +2 more
openaire   +1 more source

Taxonomy of conflicts in network security policies

IEEE Communications Magazine, 2006
Network security polices are essential elements in Internet security devices that provide traffic filtering, integrity, confidentiality, and authentication. Network security perimeter devices such as firewalls, IPSec, and IDS/IPS devices operate based on locally configured policies.
H. Hamed, E. Al-Shaer
openaire   +1 more source

Home - About - Disclaimer - Privacy