Please use this identifier to cite or link to this item: http://hdl.handle.net/10609/1419
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPreda, Stere-
dc.contributor.authorCuppens, Nora-
dc.contributor.authorCuppens, Frederic-
dc.contributor.authorGarcia-Alfaro, Joaquin-
dc.contributor.authorTourain, Laurent-
dc.contributor.otherUniversitat Oberta de Catalunya. K-ryptography and Information Security for Open Networks (KISON)en
dc.date.accessioned2010-02-16T11:58:26Z-
dc.date.available2010-02-16T11:58:26Z-
dc.date.issued2007-
dc.identifier.citationPreda, S.; Cuppens, N.; Cuppens, F.; García-Alfaro, J.; Navarro, G.; Tourain, L. (2007). "Reliable Process for Security Policy Deployment". In: International Conference on Security and Cryptography (Secrypt 2007). INSTICC. Barcelona. 28 - 31 July.-
dc.identifier.urihttp://hdl.handle.net/10609/1419-
dc.description.abstractWe focus in this paper on the problem of configuring and managing network security devices, such as Fire-walls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.en
dc.language.isoeng-
dc.rightsNO-
dc.subject.lcshComputer networks -- Security measuresen
dc.subject.lcshComputer securityen
dc.subject.lcshFirewalls (Computer security)en
dc.titleReliable process for security policy deployment-
dc.typeinfo:eu-repo/semantics/conferenceObject-
dc.audience.mediatorTheme areas::Computer Science, Technology and Multimediaen
dc.subject.lemacOrdinadors, Xarxes d' -- Mesures de seguretatca
dc.subject.lemacInformàtica -- Mesures de seguretatca
dc.subject.lemacTallafocs (Seguretat informàtica)ca
dc.subject.lcshesOrdenadores, Redes de -- Medidas de seguridades
dc.subject.lcshesInformática -- Medidas de seguridades
dc.subject.lcshesCortafuegos (Seguridad informática)es
Appears in Collections:Conferències

Files in This Item:
File Description SizeFormat 
Preda_SECRYPT2007_Reliable.pdf302,39 kBAdobe PDFThumbnail
View/Open
Share:
Export:
View statistics

Items in repository are protected by copyright, with all rights reserved, unless otherwise indicated.