Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10609/1419
Registro completo de metadatos
Campo DC | Valor | Lengua/Idioma |
---|---|---|
dc.contributor.author | Preda, Stere | - |
dc.contributor.author | Cuppens, Nora | - |
dc.contributor.author | Cuppens, Frederic | - |
dc.contributor.author | Garcia-Alfaro, Joaquin | - |
dc.contributor.author | Tourain, Laurent | - |
dc.contributor.other | Universitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON) | en |
dc.date.accessioned | 2010-02-16T11:58:26Z | - |
dc.date.available | 2010-02-16T11:58:26Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | Preda, S.; Cuppens, N.; Cuppens, F.; García-Alfaro, J.; Navarro, G.; Tourain, L. (2007). "Reliable Process for Security Policy Deployment". In: International Conference on Security and Cryptography (Secrypt 2007). INSTICC. Barcelona. 28 - 31 July. | - |
dc.identifier.uri | http://hdl.handle.net/10609/1419 | - |
dc.description.abstract | We focus in this paper on the problem of configuring and managing network security devices, such as Fire-walls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies. | en |
dc.language.iso | eng | - |
dc.rights | NO | - |
dc.subject.lcsh | Computer networks -- Security measures | en |
dc.subject.lcsh | Computer security | en |
dc.subject.lcsh | Firewalls (Computer security) | en |
dc.title | Reliable process for security policy deployment | - |
dc.type | info:eu-repo/semantics/conferenceObject | - |
dc.audience.mediator | Theme areas::Computer Science, Technology and Multimedia | en |
dc.subject.lemac | Ordinadors, Xarxes d' -- Mesures de seguretat | ca |
dc.subject.lemac | Informàtica -- Mesures de seguretat | ca |
dc.subject.lemac | Tallafocs (Seguretat informàtica) | ca |
dc.subject.lcshes | Ordenadores, Redes de -- Medidas de seguridad | es |
dc.subject.lcshes | Informática -- Medidas de seguridad | es |
dc.subject.lcshes | Cortafuegos (Seguridad informática) | es |
Aparece en las colecciones: | Conferències |
Ficheros en este ítem:
Fichero | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Preda_SECRYPT2007_Reliable.pdf | 302,39 kB | Adobe PDF | Visualizar/Abrir |
Comparte:
Los ítems del Repositorio están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.