Results 311 to 320 of about 1,754,267 (361)
Some of the next articles are maybe not open access.
Development of security policies for private networks
International Journal of Network Management, 2003AbstractWith the current worldwide emphasis on e‐business, the development of sound network security policies for private networks connected to the Internet is becoming of increasing importance. This paper identifies a general network security profile upon which current and planned network security states can be mapped.
openaire +2 more sources
Security Policy Violations in SDN Data Plane
IEEE/ACM Transactions on Networking, 2018Software-defined networking (SDN) utilizes a centralized controller to distribute packet processing rules to network switches. However, rules are often generated by the applications developed by different organizations, so they may conflict with each ...
Qi Li+4 more
semanticscholar +1 more source
A Measurement Study of the Content Security Policy on Real-World Applications
International Journal of Network Security, 2016Content Security Policy (CSP) is a browser security mechanism that aims to protect websites from content injection attacks. To adopt CSP, website developers need to manually compile a list of allowed content sources.
Kailas Patil, Braun Frederik
semanticscholar +1 more source
A multilevel security policy model for networks
Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration, 2002Consideration is given to the development of security policy models for networks which can operate in a multilevel security environment. An outline is presented of an abstract security policy model which addresses the access control and information flow requirements in a multilevel network.
openaire +2 more sources
Network security project management: a security policy-based approach
2007 IEEE International Conference on Systems, Man and Cybernetics, 2007Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic representation of security policies. This methodology is used within the SECOMO model. Two models are defined: the a priori model and the a posteriori model.
N. Boudriga, J. Krichene
openaire +2 more sources
Reliable security policy in mobile distributed network
2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016In this proposed paper, trusted policy based routing algorithm(TSPRA) is implemented for high security in Mobile Distributed Networks due to unreliability in storing the data and provides the solution to the problems of traditional authorization techniques. Here, Every Mobile Host (MH) has an Access Control Policy (ACP) with any specific combination of
A Aravindan+2 more
openaire +2 more sources
Model-Driven Extraction and Analysis of Network Security Policies
2013Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy ...
Martinez Perez, Salvador+4 more
openaire +4 more sources
A Verification Algorithm of Network Security Policy Repository
2009 International Conference on Information Technology and Computer Science, 2009The validity of the network security policy has important impacts on the safety performance of network information system. For purpose of verifying the network security policy repository effectively, a verification model of security policy repository based on EHLPN is proposed. The HLPN is expanded, and based on the establishing of EHLPN model directed
Shunzheng Yu, Chenghua Tang
openaire +2 more sources
An information security policy in converged network environment
2010 IEEE International Conference on Information Theory and Information Security, 2010On the basis of converged network features and aimed at specific military security protection needs, an information security policy in converged network environment was proposed in the paper. Referred to three core security control areas of ISO/IEC 17799∶2005, including asset management, access control and information security incident management, the ...
Ming Zhou+3 more
openaire +2 more sources
Security Framework for Home Network: Authentication, Authorization, and Security Policy
2007As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping ...
Sangwook Kim+4 more
openaire +2 more sources