2012
DOI: 10.1016/j.cose.2011.10.003
|View full text |Cite
|
Sign up to set email alerts
|

Formal security policy implementations in network firewalls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 56 publications
0
3
0
Order By: Relevance
“…Once users are authenticated (authentication) it is necessary to ensure these users only have access to information and business processes for which they are authorized (authorization). Traditionally, authorization is established by means of filtering mechanisms [46]. Filtering mechanisms consists of the specification of security policies (such as RBAC policies) that define conditions (rules) under which users can or cannot access the resources (systems or information).…”
Section: Feature Model For Authorizationmentioning
confidence: 99%
“…Once users are authenticated (authentication) it is necessary to ensure these users only have access to information and business processes for which they are authorized (authorization). Traditionally, authorization is established by means of filtering mechanisms [46]. Filtering mechanisms consists of the specification of security policies (such as RBAC policies) that define conditions (rules) under which users can or cannot access the resources (systems or information).…”
Section: Feature Model For Authorizationmentioning
confidence: 99%
“…Firewall provides an effective defense mechanism against network attacks by performing careful gatekeeping over the communication traffic that enter and exit the protected system [14] [15], that is to say, user may deploy security policies by running a gateway-level firewall to prevent hacker attacks from external network. Therefore, a firewall provides a clean interface to control bidirectional access to/from an individual application, an entire device, or a portion of a network [16]. The application of firewall has been used extensively to the conventional Internet, WSNs, and network based embedded systems [15] [19].…”
Section: Introductionmentioning
confidence: 99%
“…In the detection, if the intrusion behavior characteristics match with the known intrusion signature database, the detection is considered to have the intrusion behavior. [5,6] This detection strategy can be targeted to establish a detection system, and has high detection efficiency, but it'll be powerless in the face of unknown intrusion behaviors. Then the anomaly detection strategy is appeared, which is assumed to be different from the normal behavior.…”
Section: Design Of Intrusion Data Classification Algorithmmentioning
confidence: 99%