Results 321 to 330 of about 1,754,267 (361)
Some of the next articles are maybe not open access.
Managing firewall and network-edge security policies
2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network ...
openaire +2 more sources
International Journal of Communication Systems, 2018
T. Sureshkumar+3 more
semanticscholar +1 more source
T. Sureshkumar+3 more
semanticscholar +1 more source
Efficient Network Security Policy Enforcement With Policy Space Analysis
IEEE/ACM Transactions on Networking, 2016Xiang Wang+3 more
semanticscholar +1 more source
Overview of the Network Security Policy for Belarus NREN
2008The proposed policy is applied to all users of Belarusian NRENs at any location and represents the obligatory requirements that must be utilized. This policy is not intended to inhibit access to information services that BY-NREN users have made accessible for public inquiry, e.g., World Wide Web, or anonymous ftp.
Mikhail Makhaniok+4 more
openaire +2 more sources
Policy Technologies for Security Management in Coalition Networks
2010The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way.
Seraphin B. Calo+9 more
openaire +1 more source
An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement
IEEE Communications Magazine, 2017Claas Lorenz+8 more
semanticscholar +1 more source
A novel approach for integrating security policy enforcement with dynamic network virtualization
IEEE Conference on Network Softwarization, 2015C. Basile+4 more
semanticscholar +1 more source
Genetic testing in prostate cancer management: Considerations informing primary care
Ca-A Cancer Journal for Clinicians, 2022Veda N Giri+2 more
exaly
Automatic Security Policy Management in Modern Networks
2005Problems in network security management have outgrown the capabilities of current human-intensive administrative methodologies. There is a significant need for automation of network security operations that is not being addressed. This article proposes a new way of looking at the security automation problem and lays down some requirements for ...
openaire +2 more sources