Movatterモバイル変換


[0]ホーム

URL:


Guttman et al., 2005 - Google Patents

Rigorous automated network security management

Guttman et al., 2005

ViewPDF
Document ID
10221493790644920981
Author
Guttman J
Herzog A
Publication year
Publication venue
International Journal of Information Security

External Links

Snippet

Achieving a security goal in a networked system requires the cooperation of a variety of devices, each device potentially requiring a different configuration. Many information security problems may be solved with appropriate models of these devices and their …
Continue reading atwww.researchgate.net (PDF) (other versions)

Similar Documents

PublicationPublication DateTitle
Guttman et al.Rigorous automated network security management
GuttmanFiltering postures: Local enforcement for global policies
Hamza et al.Clear as MUD: Generating, validating and applying IoT behavioral profiles
Beckett et al.Control plane compression
Liu et al.Diverse firewall design
US8135815B2 (en)Method and apparatus for network wide policy-based analysis of configurations of devices
US7003562B2 (en)Method and apparatus for network wide policy-based analysis of configurations of devices
Bringhenti et al.Improving the formal verification of reachability policies in virtualized networks
Uribe et al.Automatic analysis of firewall and network intrusion detection system configurations
Al-ShaerAutomated firewall analytics: Design, configuration and optimization
Senn et al.Firewall conformance testing
Fu et al.Automatic generation of ipsec/vpn security policies in an intra-domain environment
GuttmanSecurity goals: Packet trajectories and strand spaces
Katsis et al.NEUTRON: a graph-based pipeline for zero-trust network architectures
Bera et al.Policy based security analysis in enterprise networks: A formal approach
Feamster et al.Towards a logic for wide-area Internet routing
Khelf et al.Ipsec/firewall security policy analysis: A survey
Souayeh et al.A fully automatic approach for fixing firewall misconfigurations
LiuFirewall policy change-impact analysis
Guttman et al.Authentication and confidentiality via IPsec
LiuFirewall design and analysis
Ranathunga et al.Identifying the missing aspects of the ANSI/ISA best practices for security policy
Halder et al.A graph based formalism for detecting flow conflicts in software defined network
ShiImproving network policy enforcement using natural language processing and programmable networks
Sviridov et al.AutoNet: Automatic Reachability Policy Management in Public Cloud Networks

[8]ページ先頭

©2009-2025 Movatter.jp