Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10609/1319
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorGarcia-Alfaro, Joaquin-
dc.contributor.authorCuppens, Nora-
dc.contributor.authorCuppens, Frederic-
dc.contributor.otherUniversitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)en
dc.date.accessioned2010-02-16T11:56:43Z-
dc.date.available2010-02-16T11:56:43Z-
dc.date.issued2010-02-16-
dc.identifier.citationGARCIA-ALFARO, J.; CUPPENS, N.; CUPPENS, F. (2008). "Complete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies". In: International Journal of Information Security. 7 (2), pp. 103-122.-
dc.identifier.issn1615-5262MIAR
-
dc.identifier.issn1615-5270MIAR
-
dc.identifier.urihttp://hdl.handle.net/10609/1319-
dc.description.abstractThe use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Nevertheless, the existence of anomalies between those rules, particularly in distributed multi-component scenarios, is very likely to degrade the network security policy. The discovery and removal of these anomalies is a serious and complex problem to solve. In this paper, we present a complete set of mechanisms for such a management.en
dc.format.mimetypeapplication/pdf-
dc.language.isoeng-
dc.rightsThe original publication is available at: http://link.springer.com/article/10.1007/s10207-007-0045-7-
dc.subject.lcshInternet -- Security measuresen
dc.subject.lcshComputer networks -- Security measuresen
dc.subject.lcshFirewalls (Computer security)en
dc.subject.lcshComputer securityen
dc.titleComplete Analysis of Configuration Rules to Guarantee Reliable Network Security Policies-
dc.typeinfo:eu-repo/semantics/article-
dc.audience.mediatorTheme areas::Computer Science, Technology and Multimediaen
dc.subject.lemacInternet -- Mesures de seguretatca
dc.subject.lemacOrdinadors, Xarxes d' -- Mesures de seguretatca
dc.subject.lemacTallafocs (Seguretat informàtica)ca
dc.subject.lemacInformàtica -- Mesures de seguretatca
dc.subject.lcshesInternet -- Medidas de seguridades
dc.subject.lcshesOrdenadores, Redes de -- Medidas de seguridades
dc.subject.lcshesCortafuegos (Seguridad informática)es
dc.subject.lcshesInformática -- Medidas de seguridades
dc.identifier.doi10.1007/s10207-007-0045-7-
dc.gir.idAR/0000001630-
dc.type.versioninfo:eu-repo/semantics/submittedVersion-
Aparece en las colecciones: Articles cientÍfics
Articles

Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
Alfaro_IJIS07_Complete_preprint.pdfPre-print687,3 kBAdobe PDFVista previa
Visualizar/Abrir
Comparte:
Exporta:
Consulta las estadísticas

Los ítems del Repositorio están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.