Please use this identifier to cite or link to this item: http://hdl.handle.net/10609/1416
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGarcia-Alfaro, Joaquin-
dc.contributor.authorCuppens, Frederic-
dc.contributor.authorCuppens, Nora-
dc.contributor.otherUniversitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)en
dc.date.accessioned2010-02-16T11:58:25Z-
dc.date.available2010-02-16T11:58:25Z-
dc.date.issued2010-02-16-
dc.identifier.citationGARCÍA, J. (2007). "Management of Exceptions on Access Control Policies". A: 22nd IFIP TC-11 International Information Security Conference. IFIP TC-11. Sandton. 14 - 16 de Maig.-
dc.identifier.isbn978-0-387-72366-2-
dc.identifier.urihttp://hdl.handle.net/10609/1416-
dc.descriptionPeer-reviewed-
dc.description.abstractThe use of languages based on positive or negative expressiveness is very common for the deployment of security policies (i.e., deployment of permissions and prohibitions on firewalls through single-handed positive or negative condition attributes). Although these languages may allow us to specify any policy, the single use of positive or negative statements alone leads to complex configurations when excluding some specific cases of general rules that should always apply. In this paper we survey such a management and study existing solutions, such as ordering of rules and segmentation of condition attributes, in order to settle this lack of expressiveness.en
dc.language.isoeng-
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/2.5/es/-
dc.subject.lcshComputer networks -- Security measuresen
dc.subject.lcshComputer securityen
dc.subject.lcshFirewalls (Computer security)en
dc.titleManagement of exceptions on access control policies-
dc.typeinfo:eu-repo/semantics/conferenceObject-
dc.audience.mediatorTheme areas::Computer Science, Technology and Multimediaen
dc.subject.lemacOrdinadors, Xarxes d' -- Mesures de seguretatca
dc.subject.lemacInformàtica -- Mesures de seguretatca
dc.subject.lemacTallafocs (Seguretat informàtica)ca
dc.subject.lcshesOrdenadores, Redes de -- Medidas de seguridades
dc.subject.lcshesInformática -- Medidas de seguridades
dc.subject.lcshesCortafuegos (Seguridad informática)es
dc.identifier.doi10.1007/978-0-387-72367-9_9-
Appears in Collections:Conferències

Files in This Item:
File Description SizeFormat 
Alfaro_IFIP2007_Management.pdf172,66 kBAdobe PDFThumbnail
View/Open
Share:
Export:
View statistics

Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.