Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/1418
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Garcia-Alfaro, Joaquin | - |
dc.contributor.author | Cuppens, Nora | - |
dc.contributor.author | Cuppens, Frederic | - |
dc.contributor.other | Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON) | en |
dc.date.accessioned | 2010-02-16T11:58:25Z | - |
dc.date.available | 2010-02-16T11:58:25Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | GARCIA-ALFARO, J.; CUPPENS, N.; CUPPENS, F. (2007). "Aggregating and Deploying Network Access Control Policies". A: 2nd International Conference on Availability, Reliability and Security (ARES 2007). IEEE Computer Society. Viena. 10 - 13 de Abril. | - |
dc.identifier.isbn | 0-7695-2775-2 | - |
dc.identifier.uri | http://hdl.handle.net/10609/1418 | - |
dc.description | Peer-reviewed | - |
dc.description.abstract | The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies - potentially easy to be evaded by unauthorized parties. We present in this paper a proposal to create, manage, and deploy consistent policies in those components in an efficient way. | en |
dc.language.iso | eng | - |
dc.rights | (c) 2007 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. | - |
dc.subject.lcsh | Computer networks -- Security measures | en |
dc.subject.lcsh | Computer security | en |
dc.subject.lcsh | Firewalls (Computer security) | en |
dc.title | Aggregating and deploying network access control policies | - |
dc.type | info:eu-repo/semantics/conferenceObject | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | Ordinadors, Xarxes d' -- Mesures de seguretat | ca |
dc.subject.lemac | Informàtica -- Mesures de seguretat | ca |
dc.subject.lemac | Tallafocs (Seguretat informàtica) | ca |
dc.subject.lcshes | Ordenadores, Redes de -- Medidas de seguridad | es |
dc.subject.lcshes | Informática -- Medidas de seguridad | es |
dc.subject.lcshes | Cortafuegos (Seguridad informática) | es |
dc.identifier.doi | 10.1109/ARES.2007.34 | - |
Aparece en las colecciones: | Conferències |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Garcia_07_Aggregating.pdf | 236,77 kB | Adobe PDF | Visualizar/Abrir |
Comparte:
Los ítems del Repositorio están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.