Results 321 to 330 of about 1,754,267 (361)
Some of the next articles are maybe not open access.

Managing firewall and network-edge security policies

2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507), 2004
Summary form only given. Firewalls are core elements in network security. However, managing firewall rules, particularly in multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered and distributed carefully in order to avoid firewall policy conflicts (or anomalies) and network ...
openaire   +2 more sources

Non‐dominated sorting particle swarm optimization (NSPSO) and network security policy enforcement for Policy Space Analysis

International Journal of Communication Systems, 2018
T. Sureshkumar   +3 more
semanticscholar   +1 more source

Efficient Network Security Policy Enforcement With Policy Space Analysis

IEEE/ACM Transactions on Networking, 2016
Xiang Wang   +3 more
semanticscholar   +1 more source

Overview of the Network Security Policy for Belarus NREN

2008
The proposed policy is applied to all users of Belarusian NRENs at any location and represents the obligatory requirements that must be utilized. This policy is not intended to inhibit access to information services that BY-NREN users have made accessible for public inquiry, e.g., World Wide Web, or anonymous ftp.
Mikhail Makhaniok   +4 more
openaire   +2 more sources

Policy Technologies for Security Management in Coalition Networks

2010
The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way.
Seraphin B. Calo   +9 more
openaire   +1 more source

An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement

IEEE Communications Magazine, 2017
Claas Lorenz   +8 more
semanticscholar   +1 more source

A novel approach for integrating security policy enforcement with dynamic network virtualization

IEEE Conference on Network Softwarization, 2015
C. Basile   +4 more
semanticscholar   +1 more source

Genetic testing in prostate cancer management: Considerations informing primary care

Ca-A Cancer Journal for Clinicians, 2022
Veda N Giri   +2 more
exaly  

Automatic Security Policy Management in Modern Networks

2005
Problems in network security management have outgrown the capabilities of current human-intensive administrative methodologies. There is a significant need for automation of network security operations that is not being addressed. This article proposes a new way of looking at the security automation problem and lays down some requirements for ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy