Peer-reviewedThe existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies - potentially easy to be evaded by unauthorized parties. We present in this paper a proposal to create, manage, and deploy consistent policies in those components in an efficient way
Firewalls and Security Gateways are core elements in network security infrastructure. As networks an...
Abstract: The use of different network security components, such as firewalls and network intrusion ...
Abstract—Current Network Access Control (NAC) technolo-gies manage the access of new devices into a ...
Network and host-based access controls, for example, firewall systems, are important points of secur...
International audienceNetwork security constitutes a critical concern when developing and maintainin...
Peer-reviewedThe use of different network security components, such as firewalls and network intrusi...
We focus in this paper on the problem of configuring and managing network security devices, such as ...
Network security should be based around security policies. From high-level natural language, non-tec...
Networked systems are ubiquitous in our modern society. They are found in settings that vary from mu...
When packet filtering is used as a security mechanism, different routers may need to cooperate to en...
Firewalls and network access controls play important roles in security control and protection. Those...
International audienceA policy mining approach that aims to automatically extract a high level of ab...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
Abstract—Current Network Access Control (NAC) technolo-gies manage the access of new devices into a ...
9 pages, 4 figures, 10 references, 7th International Symposium on System and Information Security (S...
Firewalls and Security Gateways are core elements in network security infrastructure. As networks an...
Abstract: The use of different network security components, such as firewalls and network intrusion ...
Abstract—Current Network Access Control (NAC) technolo-gies manage the access of new devices into a ...
Network and host-based access controls, for example, firewall systems, are important points of secur...
International audienceNetwork security constitutes a critical concern when developing and maintainin...
Peer-reviewedThe use of different network security components, such as firewalls and network intrusi...
We focus in this paper on the problem of configuring and managing network security devices, such as ...
Network security should be based around security policies. From high-level natural language, non-tec...
Networked systems are ubiquitous in our modern society. They are found in settings that vary from mu...
When packet filtering is used as a security mechanism, different routers may need to cooperate to en...
Firewalls and network access controls play important roles in security control and protection. Those...
International audienceA policy mining approach that aims to automatically extract a high level of ab...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
Abstract—Current Network Access Control (NAC) technolo-gies manage the access of new devices into a ...
9 pages, 4 figures, 10 references, 7th International Symposium on System and Information Security (S...
Firewalls and Security Gateways are core elements in network security infrastructure. As networks an...
Abstract: The use of different network security components, such as firewalls and network intrusion ...
Abstract—Current Network Access Control (NAC) technolo-gies manage the access of new devices into a ...