메뉴 건너뛰기




Volumn , Issue , 2007, Pages 5-15

Reliable process for security policy deployment

Author keywords

Deployment of policies; Network security; Policy anomalies; Security devices; Security rules

Indexed keywords

ACCESS CONTROL MODELS; AUTOMATIC COMPILATION; DEPLOYMENT OF POLICIES; DEPLOYMENT PROCESS; INTRUSION DETECTION SYSTEMS; POLICY ANOMALIES; SECURITY ADMINISTRATOR; SECURITY DEVICES; SECURITY POLICY; SECURITY REQUIREMENTS; SECURITY RULES; VIRTUAL PRIVATE NETWORKS;

EID: 67649816039     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 9
    • 41849089272 scopus 로고    scopus 로고
    • Cisco Systems, Inc, Online, Available from
    • Cisco Systems, Inc. Cisco Security Manager Product Information. [Online]. Available from: http://cisco.com/go/csmanager.
    • Cisco Security Manager Product Information
  • 13
    • 84944041936 scopus 로고    scopus 로고
    • Fu, Z., Wu, S. F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C. IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution. In Policy 2001 Workshop, pp. 39-56, 2001.
    • Fu, Z., Wu, S. F., Huang, H., Loh, K., Gong, F., Baldine, I., Xu, C. IPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution. In Policy 2001 Workshop, pp. 39-56, 2001.
  • 14
    • 33645337636 scopus 로고    scopus 로고
    • Taxonomy of conflicts in network security policies
    • Hamed, H. H. and Al-Shaer, E. S. Taxonomy of conflicts in network security policies. In IEEE Communications, 44(3):134-141,2006.
    • (2006) IEEE Communications , vol.44 , Issue.3 , pp. 134-141
    • Hamed, H.H.1    Al-Shaer, E.S.2
  • 15
    • 34548187500 scopus 로고    scopus 로고
    • Role Based Network Security Model: A Forward Step towards Firewall Management
    • Algiers
    • Hassan, A. and Hudec, L. Role Based Network Security Model: A Forward Step towards Firewall Management. In Workshop On Security of Information Technologies, Algiers, 2003.
    • (2003) Workshop On Security of Information Technologies
    • Hassan, A.1    Hudec, L.2
  • 16


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.