Reasoning about firewall policies through refinement and composition

U Neville, SN Foley - Journal of Computer Security, 2018 - content.iospress.com
Network and host-based access controls, for example, firewall systems, are important points
of security-demarcation, operating as a front-line defence for networks and networked …

An Effective Naming Heterogeneity Resolution for XACML Policy Evaluation in a Distributed Environment

TP Kuang, H Ibrahim, F Sidi, NI Udzir, AA Alwan - Symmetry, 2021 - mdpi.com
Policy evaluation is a process to determine whether a request submitted by a user satisfies
the access control policies defined by an organization. Naming heterogeneity between the …

A policy-based management framework for cloud computing security

OA Runsewe - 2014 - ruor.uottawa.ca
Cloud Computing has changed how computing is done as applications and services are
being consumed from the cloud. It has attracted a lot of attention in recent times due to the …

[图书][B] Evaluation of the Intents of Noncompliance with the Organizational Information Systems Security Policy

A Song - 2018 - search.proquest.com
Abstract Information systems security breaches in the USA are aggravated by the lack of
steadfastness displayed by organizations' insiders. That lack of dedication often leads to …

[PDF][PDF] An Effective Naming Heterogeneity Resolution for XACML Policy Evaluation in a Distributed Environment. Symmetry 2021, 13, 2394

TP Kuang, H Ibrahim, F Sidi, NI Udzir, AA Alwan - 2021 - researchgate.net
Policy evaluation is a process to determine whether a request submitted by a user satisfies
the access control policies defined by an organization. Naming heterogeneity between the …

Updating security information on multiple computing machines

M Martino, G Ciano, R Giordani, G Bernardini… - US Patent …, 2021 - Google Patents
A computing system comprises a plurality of computing machines, each computing machine
storing security information corresponding with the respective computing machine …

Разработка транслятора политик контроля доступа для межсетевых экранов

ДВ Балуев, АГ Новопашенный - Неделя науки СПбПУ, 2016 - elibrary.ru
Введение. Рост компьютерных систем, как в масштабе, так и в сложности,
представляет огромные проблемы для управления. Такие системы часто …

[引用][C] Model-Based Tool-Assistance for Packet-Filter Design and its Future

G Kaur, SN Panda, DS Dhaliwal