K Sengaphay, S Saiyod, N Benjamas - Information Science and …, 2016 - Springer
The private cloud system plays an important role in the present time because it has the ability to adjust to work better based on the needs of users, such as an adjustment of …
S Pozo, R Ceballos, RM Gasca - … Conference, Perugia, Italy, June 30–July …, 2008 - Springer
Abstract Design and management of firewall rule sets is difficult and error prone, mainly because the translation of access control requirements to low level languages is difficult …
S Pozo, R Ceballos, RM Gasca - Information and Software Technology, 2009 - Elsevier
The design and management of firewall rule sets is a very difficult and error-prone task because of the difficulty of translating access control requirements into complex low-level …
The security provided by a firewall for a computer network almost completely depends on the rules it enforces. For over a decade, it has been a well-known and unsolved problem that …
SP Hidalgo, R Ceballos… - 2008 Third International …, 2008 - ieeexplore.ieee.org
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to be …
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example …
S Pozo, R Ceballos, RM Gasca… - … on Emerging Security …, 2008 - ieeexplore.ieee.org
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, such as …
SH Kim, HJ Lee - KSII Transactions on Internet and Information …, 2010 - koreascience.kr
The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in …