Empreu aquest identificador per citar o enllaçar aquest ítem:
http://hdl.handle.net/10609/1416
Registre complet de metadades
Camp DC | Valor | Llengua/Idioma |
---|---|---|
dc.contributor.author | Garcia-Alfaro, Joaquin | - |
dc.contributor.author | Cuppens, Frederic | - |
dc.contributor.author | Cuppens, Nora | - |
dc.contributor.other | Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON) | en |
dc.date.accessioned | 2010-02-16T11:58:25Z | - |
dc.date.available | 2010-02-16T11:58:25Z | - |
dc.date.issued | 2010-02-16 | - |
dc.identifier.citation | GARCÍA, J. (2007). "Management of Exceptions on Access Control Policies". A: 22nd IFIP TC-11 International Information Security Conference. IFIP TC-11. Sandton. 14 - 16 de Maig. | - |
dc.identifier.isbn | 978-0-387-72366-2 | - |
dc.identifier.uri | http://hdl.handle.net/10609/1416 | - |
dc.description | Peer-reviewed | - |
dc.description.abstract | The use of languages based on positive or negative expressiveness is very common for the deployment of security policies (i.e., deployment of permissions and prohibitions on firewalls through single-handed positive or negative condition attributes). Although these languages may allow us to specify any policy, the single use of positive or negative statements alone leads to complex configurations when excluding some specific cases of general rules that should always apply. In this paper we survey such a management and study existing solutions, such as ordering of rules and segmentation of condition attributes, in order to settle this lack of expressiveness. | en |
dc.language.iso | eng | - |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/2.5/es/ | - |
dc.subject.lcsh | Computer networks -- Security measures | en |
dc.subject.lcsh | Computer security | en |
dc.subject.lcsh | Firewalls (Computer security) | en |
dc.title | Management of exceptions on access control policies | - |
dc.type | info:eu-repo/semantics/conferenceObject | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | Ordinadors, Xarxes d' -- Mesures de seguretat | ca |
dc.subject.lemac | Informàtica -- Mesures de seguretat | ca |
dc.subject.lemac | Tallafocs (Seguretat informàtica) | ca |
dc.subject.lcshes | Ordenadores, Redes de -- Medidas de seguridad | es |
dc.subject.lcshes | Informática -- Medidas de seguridad | es |
dc.subject.lcshes | Cortafuegos (Seguridad informática) | es |
dc.identifier.doi | 10.1007/978-0-387-72367-9_9 | - |
Apareix a les col·leccions: | Conferències |
Arxius per aquest ítem:
Arxiu | Descripció | Mida | Format | |
---|---|---|---|---|
Alfaro_IFIP2007_Management.pdf | 172,66 kB | Adobe PDF | ![]() Veure/Obrir |
Comparteix:


Els ítems del Repositori es troben protegits per copyright, amb tots els drets reservats, sempre i quan no s’indiqui el contrari.