Role-Based Access Control Models
Computer
Using a classification of management policies for policy specification and policy transformation
Proceedings of the fourth international symposium on Integrated network management IV
Building Internet firewalls (2nd ed.)
Building Internet firewalls (2nd ed.)
Derivation of Backup Service Management Applications from Service and System Models
DSOM '99 Proceedings of the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management: Active Technologies for Network and Service Management
Model-Based Tool-Assistance for Packet-Filter Design
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Firewalls and Internet Security: Repelling the Wily Hacker
Firewalls and Internet Security: Repelling the Wily Hacker
Firmato: A novel firewall management toolkit
ACM Transactions on Computer Systems (TOCS)
Policy Modeling and Refinement for Network Security Systems
POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
Security and management policy specification
IEEE Network: The Magazine of Global Internetworking
Improving the configuration management of large network security systems
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Hi-index | 0.00 |
As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of mechanisms necessary to fulfil the protection requirements of the upcoming scenarios. The integrated design and management of different security technologies and mechanisms are thus of great interest. Especially in large-scale environments, the employment of security services and the design of their configurations shall be supported by a structured technique which separates the consideration of the system as a whole from the detailed design of subsystems. To accomplish this goal, this paper presents a scalable approach for the modelling of large security systems, relying on the concepts of policy-based management and model-based management.