Virtual private networks (vpn): a conceptual review of security protocols and their application in modern networks

MO Akinsanya, CC Ekechi, CD Okeke - Engineering Science & …, 2024 - fepbl.com
… (VPNs) involves several key steps to ensure the successful execution of the … of Virtual
Private Networks (VPNs), focusing on their security protocols and application in modern networks. …

Dynamic and application-aware provisioning of chained virtual security network functions

R Doriguzzi-Corin, S Scott-Hayward… - … on Network and …, 2019 - ieeexplore.ieee.org
… applications and the security policies defined by the TSP. TSP’s … enforce the security close
to the user by placing VSNFs on ep1 (Ru = {ep1}), or to protect a portion of the TSP’s network, …

Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks

D Bringhenti, J Yusupov, AM Zarca, F Valenza… - Computer Networks, 2022 - Elsevier
… configuration is compliant with the security policies to be enforced in the network. On the …
should be allocated in a virtual topology to enforce the security policies, and it can guarantee …

Scrutinizing privacy policy compliance of virtual personal assistant apps

F Xie, Y Zhang, C Yan, S Li, L Bu, K Chen… - Proceedings of the 37th …, 2022 - dl.acm.org
… VPA applications (or VPA apps for short) are accompanied by a privacy policy … to comply
with them. In this work, we conduct the first systematic study on the privacy policy compliance

[PDF][PDF] A remote access security model based on vulnerability management

S Ndichu, S McOyowo, H Okoyo… - Int. J. Inf. Technol. Comput …, 2020 - academia.edu
Virtual Private Network (VPN) securely connects a remote … Network security policy enforcement.
c. Triage, where safe … data and resources after compliance with security policies. e. The …

Machine learning based deep job exploration and secure transactions in virtual private cloud systems

S Rajasoundaran, AV Prabu, S Routray… - … & Security, 2021 - Elsevier
… through a secure link (tunnel) using Virtual Private Networks (… is important to make consistent
execution. The scheduler … VPC local network group has own identity and security policy

Fog-based local and remote policy enforcement for preserving data privacy in the Internet of Things

A Al-Hasnawi, SM Carr, A Gupta - Internet of Things, 2019 - Elsevier
networks, servers, and clouds, which are untrusted parties for data owners. In this paper, a
solution called Policy Enforcement … PEFM uses the power of policy enforcement in the edge-…

Compliance with Bring Your Own Device security policies in organizations: A systematic literature review

R Palanisamy, AA Norman, MLM Kiah - Computers & Security, 2020 - Elsevier
… to security policy compliant behavior to create a secure environment in … security policy
compliance remain scarce, which makes this review a novel contribution to human security

Enforcing behavioral profiles through software-defined networks in the industrial internet of things

SNM García, A Molina Zarca, JL Hernández-Ramos… - Applied Sciences, 2019 - mdpi.com
… the obtaining and enforcement of MUD policies through the use of a Software-Defined Network
(… and enforce the two different security policy levels. In our implementation, we consider a …

[PDF][PDF] Compliance Cautions: Investigating Security Issues Associated with US Digital-Security Standards.

R Stevens, J Dykstra, WK Everette, J Chapman… - NDSS, 2020 - ndss-symposium.org
… services that are fully compliant with P1075, marketing their virtual private server services
to customers … We recommend that P1075 enforce protection for all FTI, regardless of source. …