Empreu aquest identificador per citar o enllaçar aquest ítem: http://hdl.handle.net/10609/1419
Títol: Reliable process for security policy deployment
Autoria: Preda, Stere
Cuppens, Nora  
Cuppens, Frederic  
Garcia-Alfaro, Joaquin  
Tourain, Laurent
Altres: Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)
Citació: Preda, S.; Cuppens, N.; Cuppens, F.; García-Alfaro, J.; Navarro, G.; Tourain, L. (2007). "Reliable Process for Security Policy Deployment". In: International Conference on Security and Cryptography (Secrypt 2007). INSTICC. Barcelona. 28 - 31 July.
Resum: We focus in this paper on the problem of configuring and managing network security devices, such as Fire-walls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.
Tipus de document: info:eu-repo/semantics/conferenceObject
Data de publicació: 2007
Apareix a les col·leccions:Conferències

Arxius per aquest ítem:
Arxiu Descripció MidaFormat 
Preda_SECRYPT2007_Reliable.pdf302,39 kBAdobe PDFThumbnail
Veure/Obrir
Comparteix:
Exporta:
Consulta les estadístiques

Els ítems del Repositori es troben protegits per copyright, amb tots els drets reservats, sempre i quan no s’indiqui el contrari.