Peer-reviewedThe use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management.preprin
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Network security should be based around security policies. From high-level natural language, non-tec...
Network and host-based access controls, for example, firewall systems, are important points of secur...
Abstract: The use of different network security components, such as firewalls and network intrusion ...
9 pages, 4 figures, 10 references, 7th International Symposium on System and Information Security (S...
This research is sponsored by DARPA under contract number N66001-00-C-8058. The views herein are tho...
Networked systems are ubiquitous in our modern society. They are found in settings that vary from mu...
Nowadays, computers and network communications have a pervasive presence in all our daily activities...
The configuration and management of security policies in enterprise networks becoming hard due to co...
Computer network security is the first line of defence to accomplish information assurance. The comp...
Peer-reviewedThe existence of errors or inconsistencies in the configuration of security components,...
One of the key challenges in computer networks is network security. For securing the network, variou...
International audienceNetwork security constitutes a critical concern when developing and maintainin...
The complexity of network topology together with heterogeneity of network services make the network ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Network security should be based around security policies. From high-level natural language, non-tec...
Network and host-based access controls, for example, firewall systems, are important points of secur...
Abstract: The use of different network security components, such as firewalls and network intrusion ...
9 pages, 4 figures, 10 references, 7th International Symposium on System and Information Security (S...
This research is sponsored by DARPA under contract number N66001-00-C-8058. The views herein are tho...
Networked systems are ubiquitous in our modern society. They are found in settings that vary from mu...
Nowadays, computers and network communications have a pervasive presence in all our daily activities...
The configuration and management of security policies in enterprise networks becoming hard due to co...
Computer network security is the first line of defence to accomplish information assurance. The comp...
Peer-reviewedThe existence of errors or inconsistencies in the configuration of security components,...
One of the key challenges in computer networks is network security. For securing the network, variou...
International audienceNetwork security constitutes a critical concern when developing and maintainin...
The complexity of network topology together with heterogeneity of network services make the network ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Network security should be based around security policies. From high-level natural language, non-tec...
Network and host-based access controls, for example, firewall systems, are important points of secur...