This thesis is devoted to a bottom-Up approachfor the management of network security policies fromhigh abstraction level with low cost and high confidence.We show that the Network Role Based Access Control(Net-RBAC) model is adapted to the specification ofnetwork access control policies. We propose policymining, a bottom-Up approach that extracts from thedeployed rules on a firewall the corresponding policymodeled with Net-RBAC. We devise a generic algorithmbased on matrix factorization, that could adapt most ofthe existing role mining techniques to extract instancesof Net-RBAC. Furthermore, knowing that the large andmedium networks are usually protected by multiplefirewalls, we handle the problem of integration of Net-RBAC policies resulti...
International audienceFirewalls are a key element in network security. They are in charge of filteri...
This paper presents a framework for representing and distributing access control policies in distrib...
Role-based access control (RBAC) is the most popular access control model currently adopted in sever...
This thesis is devoted to a bottom-Up approachfor the management of network security policies fromhi...
Cette thèse est consacrée à une approcheascendante pour l’administration de la sécurité desréseaux i...
Today’s corporations rely entirely on their information systems, usually connected to the Internet. ...
International audienceTodays enterprises rely entirely on their information systems, usually connect...
International audienceA policy mining approach that aims to automatically extract a high level of ab...
Security in computer networks is a very complex task especially if it is required to separate a corp...
Access control is currently one of the most important topics in ICT security. The main areas of rese...
Role-based access control (RBAC) offers significant advan-tages over lower-level access control poli...
The analysis of security policies designed for ICS and SCADA can benefit significantly from the adop...
In this paper we describe the work devising a new technique for role-finding to implement Role-Based...
Role-based access control (RBAC) is the most popular access control model currently adopted in sever...
International audienceFirewalls are a key element in network security. They are in charge of filteri...
This paper presents a framework for representing and distributing access control policies in distrib...
Role-based access control (RBAC) is the most popular access control model currently adopted in sever...
This thesis is devoted to a bottom-Up approachfor the management of network security policies fromhi...
Cette thèse est consacrée à une approcheascendante pour l’administration de la sécurité desréseaux i...
Today’s corporations rely entirely on their information systems, usually connected to the Internet. ...
International audienceTodays enterprises rely entirely on their information systems, usually connect...
International audienceA policy mining approach that aims to automatically extract a high level of ab...
Security in computer networks is a very complex task especially if it is required to separate a corp...
Access control is currently one of the most important topics in ICT security. The main areas of rese...
Role-based access control (RBAC) offers significant advan-tages over lower-level access control poli...
The analysis of security policies designed for ICS and SCADA can benefit significantly from the adop...
In this paper we describe the work devising a new technique for role-finding to implement Role-Based...
Role-based access control (RBAC) is the most popular access control model currently adopted in sever...
International audienceFirewalls are a key element in network security. They are in charge of filteri...
This paper presents a framework for representing and distributing access control policies in distrib...
Role-based access control (RBAC) is the most popular access control model currently adopted in sever...