Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper provides an overview of the different type of policies relating to security in networks, and a taxonomy of the research into systems which have been proposed to support the network administrators in difficult tasks of creating, managing and deploying these policies
International audienceNetwork security constitutes a critical concern when developing and maintainin...
Abstract: This work presents a framework for network system development that introduces a new phase ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Network security should be based around security policies. From high-level natural language, non-tec...
Computer firewalls are widely used for security policy enforcement and access control. Current firew...
The paper considers basic features and requirements for information security policies and issues of ...
Computer network security is the first line of defence to accomplish information assurance. The comp...
The configuration and management of security controls and applications is complex and not well under...
Firewalls are one of the most complicated devices of a network to configure, manage and troubleshoot...
Security in computer networks is a very complex task especially if it is required to separate a corp...
Abstract: The security configuration of large networked ICT systems is a difficult and error-prone t...
Firewalls are set up to protect computer networks. Originally, networks were just coupled together, ...
Network and host-based access controls, for example, firewall systems, are important points of secur...
With the rapid increase in the number of LAN connections to the world's largest computer network (th...
We focus in this paper on the problem of configuring and managing network security devices, such as ...
International audienceNetwork security constitutes a critical concern when developing and maintainin...
Abstract: This work presents a framework for network system development that introduces a new phase ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...
Network security should be based around security policies. From high-level natural language, non-tec...
Computer firewalls are widely used for security policy enforcement and access control. Current firew...
The paper considers basic features and requirements for information security policies and issues of ...
Computer network security is the first line of defence to accomplish information assurance. The comp...
The configuration and management of security controls and applications is complex and not well under...
Firewalls are one of the most complicated devices of a network to configure, manage and troubleshoot...
Security in computer networks is a very complex task especially if it is required to separate a corp...
Abstract: The security configuration of large networked ICT systems is a difficult and error-prone t...
Firewalls are set up to protect computer networks. Originally, networks were just coupled together, ...
Network and host-based access controls, for example, firewall systems, are important points of secur...
With the rapid increase in the number of LAN connections to the world's largest computer network (th...
We focus in this paper on the problem of configuring and managing network security devices, such as ...
International audienceNetwork security constitutes a critical concern when developing and maintainin...
Abstract: This work presents a framework for network system development that introduces a new phase ...
Abstract. We present a unified theory for verifying network security policies. A security policy is ...