Results 301 to 310 of about 1,754,267 (361)
Some of the next articles are maybe not open access.
A concept of unification of network security policies
Proceedings of the Fifth International Conference on Security of Information and Networks, 2012Security policy is a main mechanism of information security management. While there are a lot of security-related standards and guidelines which specify requirements for high-level security policies, implementation of network security policy still depends on interfaces provided by network security systems (NSS).
Dmitry Chernyavskiy+1 more
openaire +2 more sources
Taxonomy of conflicts in network security policies
IEEE Communications Magazine, 2006Network security polices are essential elements in Internet security devices that provide traffic filtering, integrity, confidentiality, and authentication. Network security perimeter devices such as firewalls, IPSec, and IDS/IPS devices operate based on locally configured policies.
Ehab Al-Shaer, H. Hamed
openaire +2 more sources
Social Networks Security Policies
2016Social networks present useful tools for communication and information sharing. While these networks have a considerable impact on users daily life, security issues are various such as privacy defects, threats on publishing personal information, spammers and fraudsters.
Jalel Akaichi+2 more
openaire +2 more sources
Implementing a Security Policy Management for 5G Customer Edge Nodes
IEEE/IFIP Network Operations and Management Symposium, 2020The upcoming 5th generation (5G) mobile networks need to support ultra-reliable communication for business and life-critical applications. To do that 5G must offer higher degree of reliability than the current Internet, where networks are often subjected
Hammad Kabir, M. Mohsin, R. Kantola
semanticscholar +1 more source
Information Security Policies for Networkable Devices
2007Recent years have seen a surge in the introduction of networkable Windows-based operating system (NWOS) devices. Some examples are home entertainment systems (e.g., Xbox), smart phones (e.g., Motorola i930 and PlamOne’s Treo), and Pocket PC (e.g., Toshiba e850). While NWOS devices present an appealing proposition for both software vendors and buyers in
Kotlarsky, , Oshri, I (Ilan), Hirsch, C
openaire +2 more sources
Security policy specification for home network
International Journal of Ad Hoc and Ubiquitous Computing, 2009As home network is expanding into ubiquitous computing environment and numerous home network services are available, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of internet, involving hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping since
Deok Gyu Lee+3 more
openaire +2 more sources
Security policy decision for automation of security network configuration
9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732), 2004IETF has proposed a policy framework called policy-based network management (PBNM). Its best point is to provide automation of network configuration. Currently network area is actively embodying PBNM for QoS provisioning, RSVP admission control, device configuration, and etc. However, security area is not greatly interest in PBNM except IPSec.
Jongsoo Jang+3 more
openaire +2 more sources
Verifiable Policy-defined Networking for Security Management
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016A common goal in network-management is security. Reliable security requires confidence in the level of protection provided. But, many obstacles hinder reliable security management; most prominent is the lack of built-in verifiability in existing management paradigms.
Dinesha Ranathunga+6 more
openaire +2 more sources
A security policy language for wireless sensor networks
Journal of Systems and Software, 2009Authenticated computer system users are only authorized to access certain data within the system. In the future, wireless sensor networks (WSNs) will need to restrict access to data as well. To date, WSN security has largely been based on encryption and authentication schemes.
Marsh, David W.+4 more
openaire +3 more sources
Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework
Network and Distributed System Security Symposium, 2016The Android framework utilizes a permission-based security model, which is essentially a variation of the ACL-based access control mechanism. This security model provides controlled access to various system resources.
Yuru Shao+4 more
semanticscholar +1 more source