Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
A review of information security issues and respective research contributions
ACM SIGMIS Database
Hi-index | 0.00 |
An efficient management is needed to make use of different security mechanisms in large networks. All mechanisms have to be configured consistently according to the security policy. To reduce complexity, the administrator should not have to cope with details not important for him.In the presented concept the network is divided into several administrative domains which are managed rather independently from each other. Each domain maintains its own network access control policy (NAP). The enterprise-wide policy is a combination of all NAPs. It is enforced by different security mechanisms which configuration can be derived from the global access policy automatically. Existing security mechanisms can be integrated by simply adding a Policy Transformation Unit.