Results 281 to 290 of about 834,303 (333)
Some of the next articles are maybe not open access.
Firewalls policies enhancement strategies towards securing network
2013 IEEE Conference on Information & Communication Technologies, 2013In the 21st century network security is rated as one of most demanding domain in computer science and engineering where numerous organizations and researchers are giving their contribution to enhance the existing network security framework in various ways. This paper is aimed at discussing about the enhancement of firewalls policies in the network. The
Vijender Kumar Solanki +3 more
openaire +1 more source
Jammer Selection Policies for Secure Wireless Networks
2011 IEEE International Conference on Communications Workshops (ICC), 2011We consider a wireless network scenario in which the communicating nodes are assisted by a number of jammers. The goal of the jammers is to obstruct potential eavesdroppers while restricting the harmful interference experienced by the legitimate receiver.
Joao P. Vilela +2 more
openaire +1 more source
Towards policy unification for enterprise network security
2017 IEEE Conference on Network Softwarization (NetSoft), 2017The task of securing the enterprise network currently involves the use of several specialized devices (i.e. 'middleboxes') to provide specific functions in order to satisfy a set of high-level defined objectives. With only a loose common goal of securing the network, these employed devices could not be more distinct in functionality - from network ...
Sadiq T. Yakasai +2 more
openaire +1 more source
Security policy management for healthcare system network
Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry, 2005. HEALTHCOM 2005., 2005Healthcare system consists of a number of sub-networks by physically. Since each sub-network has management privileges and policies individually, it is difficult to respond to harmful traffic such as warm viruses that affect entire networks. In this paper, we propose a high-level policy language and a middle-level data structure for the healthcare ...
null Kanghee Lee +3 more
openaire +1 more source
Verifiable Policy-defined Networking for Security Management
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016A common goal in network-management is security. Reliable security requires confidence in the level of protection provided. But, many obstacles hinder reliable security management; most prominent is the lack of built-in verifiability in existing management paradigms.
Michelle McClintock +6 more
openaire +1 more source
Security policy architecture for 5G Networks
2023 14th International Conference on Network of the Future (NoF), 2023Wassim Mohamed Laïd Koribeche +2 more
openaire +1 more source
Managing firewall and network-edge security policies
2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network ...
openaire +1 more source
Network-Security-Policy Analysis
2014Computer network security is the first line of defence to accomplish information assurance. The computer network is at risk without a well-designed and flawless implemented network security policy. The main problem is that network administrators are not able to verify the network security policy.
openaire +1 more source
International Journal of Communication Systems, 2018
T. Sureshkumar +3 more
semanticscholar +1 more source
T. Sureshkumar +3 more
semanticscholar +1 more source
A formal approach for network security policy validation
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017Fulvio Valenza +5 more
semanticscholar +1 more source

