Empreu aquest identificador per citar o enllaçar aquest ítem:
http://hdl.handle.net/10609/1319
Registre complet de metadades
Camp DC | Valor | Llengua/Idioma |
---|---|---|
dc.contributor.author | Garcia-Alfaro, Joaquin | - |
dc.contributor.author | Cuppens, Nora | - |
dc.contributor.author | Cuppens, Frederic | - |
dc.contributor.other | Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON) | en |
dc.date.accessioned | 2010-02-16T11:56:43Z | - |
dc.date.available | 2010-02-16T11:56:43Z | - |
dc.date.issued | 2010-02-16 | - |
dc.identifier.citation | GARCIA-ALFARO, J.; CUPPENS, N.; CUPPENS, F. (2008). "Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies". In: International Journal of Information Security. 7 (2), pp. 103-122. | - |
dc.identifier.issn | 1615-5262MIAR | - |
dc.identifier.issn | 1615-5270MIAR | - |
dc.identifier.uri | http://hdl.handle.net/10609/1319 | - |
dc.description.abstract | The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management. | en |
dc.format.mimetype | application/pdf | - |
dc.language.iso | eng | - |
dc.rights | The original publication is available at: http://link.springer.com/article/10.1007/s10207-007-0045-7 | - |
dc.subject.lcsh | Internet -- Security measures | en |
dc.subject.lcsh | Computer networks -- Security measures | en |
dc.subject.lcsh | Firewalls (Computer security) | en |
dc.subject.lcsh | Computer security | en |
dc.title | Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies | - |
dc.type | info:eu-repo/semantics/article | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | Internet -- Mesures de seguretat | ca |
dc.subject.lemac | Ordinadors, Xarxes d' -- Mesures de seguretat | ca |
dc.subject.lemac | Tallafocs (Seguretat informàtica) | ca |
dc.subject.lemac | Informàtica -- Mesures de seguretat | ca |
dc.subject.lcshes | Internet -- Medidas de seguridad | es |
dc.subject.lcshes | Ordenadores, Redes de -- Medidas de seguridad | es |
dc.subject.lcshes | Cortafuegos (Seguridad informática) | es |
dc.subject.lcshes | Informática -- Medidas de seguridad | es |
dc.identifier.doi | 10.1007/s10207-007-0045-7 | - |
dc.gir.id | AR/0000001630 | - |
dc.type.version | info:eu-repo/semantics/submittedVersion | - |
Apareix a les col·leccions: | Articles cientÍfics Articles |
Arxius per aquest ítem:
Arxiu | Descripció | Mida | Format | |
---|---|---|---|---|
Alfaro_IJIS07_Complete_preprint.pdf | Pre-print | 687,3 kB | Adobe PDF | Veure/Obrir |
Comparteix:
Els ítems del Repositori es troben protegits per copyright, amb tots els drets reservats, sempre i quan no s’indiqui el contrari.