Results 311 to 320 of about 1,754,267 (361)
Some of the next articles are maybe not open access.

Development of security policies for private networks

International Journal of Network Management, 2003
AbstractWith the current worldwide emphasis on e‐business, the development of sound network security policies for private networks connected to the Internet is becoming of increasing importance. This paper identifies a general network security profile upon which current and planned network security states can be mapped.
openaire   +2 more sources

Security Policy Violations in SDN Data Plane

IEEE/ACM Transactions on Networking, 2018
Software-defined networking (SDN) utilizes a centralized controller to distribute packet processing rules to network switches. However, rules are often generated by the applications developed by different organizations, so they may conflict with each ...
Qi Li   +4 more
semanticscholar   +1 more source

A Measurement Study of the Content Security Policy on Real-World Applications

International Journal of Network Security, 2016
Content Security Policy (CSP) is a browser security mechanism that aims to protect websites from content injection attacks. To adopt CSP, website developers need to manually compile a list of allowed content sources.
Kailas Patil, Braun Frederik
semanticscholar   +1 more source

A multilevel security policy model for networks

Proceedings. IEEE INFOCOM '90: Ninth Annual Joint Conference of the IEEE Computer and Communications Societies@m_The Multiple Facets of Integration, 2002
Consideration is given to the development of security policy models for networks which can operate in a multilevel security environment. An outline is presented of an abstract security policy model which addresses the access control and information flow requirements in a multilevel network.
openaire   +2 more sources

Network security project management: a security policy-based approach

2007 IEEE International Conference on Systems, Man and Cybernetics, 2007
Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic representation of security policies. This methodology is used within the SECOMO model. Two models are defined: the a priori model and the a posteriori model.
N. Boudriga, J. Krichene
openaire   +2 more sources

Reliable security policy in mobile distributed network

2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2016
In this proposed paper, trusted policy based routing algorithm(TSPRA) is implemented for high security in Mobile Distributed Networks due to unreliability in storing the data and provides the solution to the problems of traditional authorization techniques. Here, Every Mobile Host (MH) has an Access Control Policy (ACP) with any specific combination of
A Aravindan   +2 more
openaire   +2 more sources

Model-Driven Extraction and Analysis of Network Security Policies

2013
Firewalls are a key element in network security. They are in charge of filtering the traffic of the network in compliance with a number of access-control rules that enforce a given security policy. In an always-evolving context, where security policies must often be updated to respond to new security requirements, knowing with precision the policy ...
Martinez Perez, Salvador   +4 more
openaire   +4 more sources

A Verification Algorithm of Network Security Policy Repository

2009 International Conference on Information Technology and Computer Science, 2009
The validity of the network security policy has important impacts on the safety performance of network information system. For purpose of verifying the network security policy repository effectively, a verification model of security policy repository based on EHLPN is proposed. The HLPN is expanded, and based on the establishing of EHLPN model directed
Shunzheng Yu, Chenghua Tang
openaire   +2 more sources

An information security policy in converged network environment

2010 IEEE International Conference on Information Theory and Information Security, 2010
On the basis of converged network features and aimed at specific military security protection needs, an information security policy in converged network environment was proposed in the paper. Referred to three core security control areas of ISO/IEC 17799∶2005, including asset management, access control and information security incident management, the ...
Ming Zhou   +3 more
openaire   +2 more sources

Security Framework for Home Network: Authentication, Authorization, and Security Policy

2007
As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Home network is exposed to various cyber attacks of Internet, involves hacking, malicious codes, worms, viruses, DoS attacks, and eavesdropping ...
Sangwook Kim   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy