2005
DOI: 10.1007/11568285_4
|View full text |Cite
|
Sign up to set email alerts
|

Improving the Configuration Management of Large Network Security Systems

Abstract: Abstract. The security mechanisms employed in today's networked environments are increasingly complex and their configuration management has an important role for the protection of these environments. Especially in large scale networks, security administrators are faced with the challenge of designing, deploying, maintaining, and monitoring a huge number of mechanisms, most of which have complicated and heterogeneous configuration syntaxes. This work offers an approach for improving the configuration managemen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
3

Year Published

2006
2006
2016
2016

Publication Types

Select...
2
2
2

Relationship

4
2

Authors

Journals

citations
Cited by 9 publications
(15 citation statements)
references
References 11 publications
0
12
0
3
Order By: Relevance
“…This validation builds upon a formalism for the modelling framework that appeared in previous works [7,8], in order to establish general conditions that a given system and policy model must uphold to assure the correctness of the policy refinement, i.e. general validation conditions for ensuring that the generated lower-level policies uphold the abstract policies defined by the user.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…This validation builds upon a formalism for the modelling framework that appeared in previous works [7,8], in order to establish general conditions that a given system and policy model must uphold to assure the correctness of the policy refinement, i.e. general validation conditions for ensuring that the generated lower-level policies uphold the abstract policies defined by the user.…”
Section: Resultsmentioning
confidence: 99%
“…A comprehensive covering of these application cases lies outside the scope of the present paper as it is done elsewhere [7,8,10]. To give a flavour of the results achieved, though, Fig.…”
Section: Practical Application and Use Examplementioning
confidence: 97%
See 2 more Smart Citations
“…These models define policies in a higher level of abstraction relying upon roles. Policies at this level are defined by object manipulation in a graphical interface, similar to the one used by [4], [5].…”
Section: Introductionmentioning
confidence: 99%