Results 291 to 300 of about 1,754,267 (361)
Some of the next articles are maybe not open access.

Network Security Policy Models

AUSCRYPT, 1990
This paper considers the development of security policy models for networks which can operate in a multilevel security environment. We outline an abstract security policy model which addresses the access control and information flow requirements in a multilevel network.
V. Varadharajan
semanticscholar   +3 more sources

MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy

ACM Symposium on Access Control Models and Technologies, 2023
Commercially-available software defined networking (SDN) technologies will play an important role in protecting the on-premises resources that remain as enterprises transition to zero trust architectures.
Iffat Anjum   +7 more
semanticscholar   +1 more source

A Firewall Policy Anomaly Detection Framework for Reliable Network Security

IEEE Transactions on Reliability, 2021
One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls.
Cengiz Toğay   +3 more
semanticscholar   +1 more source

Intent-Driven Security Policy Management for Software-Defined Systems

IEEE Transactions on Network and Service Management, 2022
Different network controllers are utilized in a multi-domain software-defined systems (SDx) to manage the networking resources. However, these controllers operate using a different high-level language (intent).
Ankur Chowdhary   +3 more
semanticscholar   +1 more source

A model of capabilities of Network Security Functions

IEEE Conference on Network Softwarization, 2022
This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks.
C. Basile   +4 more
semanticscholar   +1 more source

NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY*

The Journal of Industrial Economics, 2010
Software security is a major concern for vendors, consumers and regulators. When vulnerabilities are discovered after the software has been sold to consumers, the firms face a dilemma. A policy of disclosing vulnerabilities and issuing updates protects only consumers who install updates, while the disclosure itself facilitates reverse engineering of ...
Choi, Jay-Pil   +2 more
openaire   +3 more sources

Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy

Network and Distributed System Security Symposium, 2016
—There is growing operational awareness of the challenges in securely operating IPv6 networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual-stack routers, we examine the extent to which security policy codified in IPv4 has ...
Jakub Czyz   +3 more
semanticscholar   +1 more source

Using security policies in a network securing process

2011 18th International Conference on Telecommunications, 2011
A security policy constitutes one of the major actors in the protection of communication networks but can be one of their drawbacks too. This can be the case if it is inadequate to the security requirements for example. For this, a security policy has to be checked before its real deployment.
Ryma Abassi, Sihem Guemara El Fatmi
openaire   +2 more sources

Design of network security policy information model for policy-based network management

The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005
An extensive network and a large variety of users may cause network security problems. So, the research of a network security has being progressed. In this paper, we present network security policy information model (NSPIM) to apply in policy-based network management systems.
Seon-gyoung Sohn, Jinoh Kim, Jungchan Na
semanticscholar   +3 more sources

Automatic analysis of security policies in industrial networks

2010 IEEE International Workshop on Factory Communication Systems Proceedings, 2010
The protection of ICT systems is a topic whose importance has been dramatically growing in the last years. In fact, their increased interconnection, both internal and through the Internet, besides having provided higher and inexpensive flexibility (e.g.
M Cheminod   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy