Results 291 to 300 of about 1,754,267 (361)
Some of the next articles are maybe not open access.
Network Security Policy Models
AUSCRYPT, 1990This paper considers the development of security policy models for networks which can operate in a multilevel security environment. We outline an abstract security policy model which addresses the access control and information flow requirements in a multilevel network.
V. Varadharajan
semanticscholar +3 more sources
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
ACM Symposium on Access Control Models and Technologies, 2023Commercially-available software defined networking (SDN) technologies will play an important role in protecting the on-premises resources that remain as enterprises transition to zero trust architectures.
Iffat Anjum+7 more
semanticscholar +1 more source
A Firewall Policy Anomaly Detection Framework for Reliable Network Security
IEEE Transactions on Reliability, 2021One of the key challenges in computer networks is network security. For securing the network, various solutions have been proposed, including network security protocols and firewalls.
Cengiz Toğay+3 more
semanticscholar +1 more source
Intent-Driven Security Policy Management for Software-Defined Systems
IEEE Transactions on Network and Service Management, 2022Different network controllers are utilized in a multi-domain software-defined systems (SDx) to manage the networking resources. However, these controllers operate using a different high-level language (intent).
Ankur Chowdhary+3 more
semanticscholar +1 more source
A model of capabilities of Network Security Functions
IEEE Conference on Network Softwarization, 2022This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks.
C. Basile+4 more
semanticscholar +1 more source
NETWORK SECURITY: VULNERABILITIES AND DISCLOSURE POLICY*
The Journal of Industrial Economics, 2010Software security is a major concern for vendors, consumers and regulators. When vulnerabilities are discovered after the software has been sold to consumers, the firms face a dilemma. A policy of disclosing vulnerabilities and issuing updates protects only consumers who install updates, while the disclosure itself facilitates reverse engineering of ...
Choi, Jay-Pil+2 more
openaire +3 more sources
Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy
Network and Distributed System Security Symposium, 2016—There is growing operational awareness of the challenges in securely operating IPv6 networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual-stack routers, we examine the extent to which security policy codified in IPv4 has ...
Jakub Czyz+3 more
semanticscholar +1 more source
Using security policies in a network securing process
2011 18th International Conference on Telecommunications, 2011A security policy constitutes one of the major actors in the protection of communication networks but can be one of their drawbacks too. This can be the case if it is inadequate to the security requirements for example. For this, a security policy has to be checked before its real deployment.
Ryma Abassi, Sihem Guemara El Fatmi
openaire +2 more sources
Design of network security policy information model for policy-based network management
The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005An extensive network and a large variety of users may cause network security problems. So, the research of a network security has being progressed. In this paper, we present network security policy information model (NSPIM) to apply in policy-based network management systems.
Seon-gyoung Sohn, Jinoh Kim, Jungchan Na
semanticscholar +3 more sources
Automatic analysis of security policies in industrial networks
2010 IEEE International Workshop on Factory Communication Systems Proceedings, 2010The protection of ICT systems is a topic whose importance has been dramatically growing in the last years. In fact, their increased interconnection, both internal and through the Internet, besides having provided higher and inexpensive flexibility (e.g.
M Cheminod+3 more
openaire +3 more sources