-
1
-
-
77952407814
-
Organization Based Access Control
-
Lake Come, Italy
-
Abou el Kalam, A., Baida, R. E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C, and Trouessin, G. Organization Based Access Control. In IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks, pp. 120-131, Lake Come, Italy, 2003.
-
(2003)
IEEE 4th Intl. Workshop on Policies for Distributed Systems and Networks
, pp. 120-131
-
-
Abou el Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
2
-
-
33845484021
-
Intrusion detection and security policy framework for distributed environments
-
Missouri, USA
-
Abou el Kalam, A., Briffaut, J., Toinard, C, and Blanc, M. Intrusion detection and security policy framework for distributed environments. In Collaborative Technologies and Systems, pp.100-106, Missouri, USA, 2005.
-
(2005)
Collaborative Technologies and Systems
, pp. 100-106
-
-
Abou el Kalam, A.1
Briffaut, J.2
Toinard, C.3
Blanc, M.4
-
3
-
-
33750978431
-
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies
-
Poland
-
Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. In Intl. Conference on Computer Safety, Reliability, and Security, pp. 182- 194, Poland, 2006.
-
(2006)
Intl. Conference on Computer Safety, Reliability, and Security
, pp. 182-194
-
-
Alfaro, J.G.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
4
-
-
33750240265
-
Analysis of Policy Anomalies on Distributed Network Security Setups
-
Germany
-
Alfaro, J. G., Cuppens, F., and Cuppens-Boulahia, N. Analysis of Policy Anomalies on Distributed Network Security Setups. In 11th European Symposium On Research In Computer Security, pp. 496-511, Germany, 2006.
-
(2006)
11th European Symposium On Research In Computer Security
, pp. 496-511
-
-
Alfaro, J.G.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
5
-
-
34548173265
-
Aggregating and Deploying Network Access Control Policies
-
Vienna, Austria
-
Alfaro, J. G., Cuppens, R, and Cuppens-Boulahia, N. Aggregating and Deploying Network Access Control Policies. In lrst Symposium on Frontiers in Availability, Reliability and Security (FARES), 2nd International Conference on Availability, Reliability and Security (ARES2007), Vienna, Austria, 2007.
-
(2007)
lrst Symposium on Frontiers in Availability, Reliability and Security (FARES), 2nd International Conference on Availability, Reliability and Security (ARES2007)
-
-
Alfaro, J.G.1
Cuppens, R.2
Cuppens-Boulahia, N.3
-
6
-
-
27644451689
-
Conflict Classification and Analysis of Distributed Fire-wall Policies
-
Al-Shaer, E. S., Hamed, H. H., and Masum, H. Conflict Classification and Analysis of Distributed Fire-wall Policies. In IEEE Journal on Selected Areas in Communications, 23(10):2069-2084, 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.10
, pp. 2069-2084
-
-
Al-Shaer, E.S.1
Hamed, H.H.2
Masum, H.3
-
7
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
Oakland, California
-
Bartal, Y., Mayer, A., Nissim, K., and Wool, A. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy, pp. 17-31, Oakland, California, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.2
Nissim, K.3
Wool, A.4
-
8
-
-
33845416851
-
Hardening large-scale networks security through a meta-policy framework
-
Adelaide, Australia
-
Blanc, M., Clemente, P., Courtieu, P., Franche, S., Oudot, L., Toinard, C. and Vessiller, L. Hardening large-scale networks security through a meta-policy framework. In Third Workshop on the Internet, Telecommunications and Signal Processing, Adelaide, Australia, 2004.
-
(2004)
Third Workshop on the Internet, Telecommunications and Signal Processing
-
-
Blanc, M.1
Clemente, P.2
Courtieu, P.3
Franche, S.4
Oudot, L.5
Toinard, C.6
Vessiller, L.7
-
9
-
-
41849089272
-
-
Cisco Systems, Inc, Online, Available from
-
Cisco Systems, Inc. Cisco Security Manager Product Information. [Online]. Available from: http://cisco.com/go/csmanager.
-
Cisco Security Manager Product Information
-
-
-
10
-
-
33746441974
-
Inheritance hierarchies in the OrBAC Model and application in a network environment
-
Turku, Finlande
-
Cuppens, F., Cuppens-Boulahia, N., and Miege, A. Inheritance hierarchies in the OrBAC Model and application in a network environment. In 2nd Foundations of Computer Security Workshop (FCS'04), Turku, Finlande, 2004.
-
(2004)
2nd Foundations of Computer Security Workshop (FCS'04)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Miege, A.3
-
11
-
-
34547491556
-
High-level conflict management strategies in advanced access control models
-
Timisoara, Roumania
-
Cuppens, F., Cuppens-Boulahia, N., and Ben Ghorbel, M. High-level conflict management strategies in advanced access control models. In Workshop on Information and Computer Security (ICS 2006), Timisoara, Roumania, 2006.
-
(2006)
Workshop on Information and Computer Security (ICS 2006)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Ben Ghorbel, M.3
-
12
-
-
84890861666
-
A formal approach to specify and deploy a network security policy
-
Toulouse, France
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T. and Miege, A. A formal approach to specify and deploy a network security policy. In 2nd Workshop on Formal Aspects in Security and Trust, pp. 203-218, Toulouse, France, 2004.
-
(2004)
2nd Workshop on Formal Aspects in Security and Trust
, pp. 203-218
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miege, A.4
-
13
-
-
84944041936
-
-
Fu, Z., Wu, S. F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C. IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution. In Policy 2001 Workshop, pp. 39-56, 2001.
-
Fu, Z., Wu, S. F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C. IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution. In Policy 2001 Workshop, pp. 39-56, 2001.
-
-
-
-
14
-
-
33645337636
-
Taxonomy of conflicts in network security policies
-
Hamed, H. H. and Al-Shaer, E. S. Taxonomy of conflicts in network security policies. In IEEE Communications, 44(3):134-141,2006.
-
(2006)
IEEE Communications
, vol.44
, Issue.3
, pp. 134-141
-
-
Hamed, H.H.1
Al-Shaer, E.S.2
-
15
-
-
34548187500
-
Role Based Network Security Model: A Forward Step towards Firewall Management
-
Algiers
-
Hassan, A. and Hudec, L. Role Based Network Security Model: A Forward Step towards Firewall Management. In Workshop On Security of Information Technologies, Algiers, 2003.
-
(2003)
Workshop On Security of Information Technologies
-
-
Hassan, A.1
Hudec, L.2
-
16
-
-
0013347631
-
-
MITRE Corp, Online, Available from
-
MITRE Corp. Common Vulnerabilities and Exposures. [Online]. Available from: http://cve.mitre.org/
-
Common Vulnerabilities and Exposures
-
-
-
17
-
-
0030086382
-
Role-Based Access Control Models
-
Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C. E. Role-Based Access Control Models. IEEE Computer, 29(2):38-47,1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
18
-
-
33750255748
-
-
Online, Available from
-
Welte, H., Kadlecsik, J., Josefsson, M., McHardy, P., and et al. The netfilter project: firewalling, nat and packet mangling for linux 2.4x and 2.6.x. [Online]. Available from: http://www.netfilter.org/
-
The netfilter project: Firewalling, nat and packet mangling for linux 2.4x and 2.6.x
-
-
Welte, H.1
Kadlecsik, J.2
Josefsson, M.3
McHardy, P.4
and et, al.5
|