The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security …
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main …
S Edirisooriya, G Edirisooriya - Proceedings 13th IEEE VLSI …, 1995 - ieeexplore.ieee.org
Scan based diagnostic schemes are used to diagnose faults in faulty circuits. Such techniques assume that the scan path itself is fault-free. However, the logic circuitry …
To police network traffic, firewalls must be configured with a set of filtering rules. The existence of errors in this set is very likely to degrade the network security policy. The …
This thesis presents a new access control model called Or-BAC (Organization-Based Access Control). We aim at overcoming the limitations of the existing models while …
JG Alfaro, F Cuppens… - … Reliability and Security …, 2007 - ieeexplore.ieee.org
The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies-potentially easy …
This dissertation describes a technique for formally analyzing a firewall security policy using a quasi-reduced multiway decision diagram model. The analysis allows a system …
P Moody, PA Watson - US Patent 8,495,721, 2013 - Google Patents
Methods, systems, and apparatus, including computer pro grams encoded on a computer storage medium, for specifying a data network security policy. In one aspect, a system …
The thesis is entitled “Integration of Constraints into Dimensionality Reduction Methods for Visualization”. The constraints here are different kinds of users' feedback when they interact …