2001
DOI: 10.1007/3-540-44569-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Model-Based Tool-Assistance for Packet-Filter Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 12 publications
0
18
0
Order By: Relevance
“…In [6], the authors adopted a better approach by using a modular architecture that separates the security policy and the underlying network topology to allow for flexible modification of the network topology without the need to update the security policy. Similar work has been done in [14] with a procedural policy definition language, and in [16] with an object-oriented policy definition language. In terms of distributed firewall policy enforcement, a novel architecture is proposed in [15] where the authors suggest using a trust management system to enforce a centralized security policy at individual network endpoints based on access rights granted to users or hosts.…”
Section: Related Workmentioning
confidence: 92%
“…In [6], the authors adopted a better approach by using a modular architecture that separates the security policy and the underlying network topology to allow for flexible modification of the network topology without the need to update the security policy. Similar work has been done in [14] with a procedural policy definition language, and in [16] with an object-oriented policy definition language. In terms of distributed firewall policy enforcement, a novel architecture is proposed in [15] where the authors suggest using a trust management system to enforce a centralized security policy at individual network endpoints based on access rights granted to users or hosts.…”
Section: Related Workmentioning
confidence: 92%
“…. , pc m is the sequence of processes in aep 1 ∧ pc x = pc i ∧ pc y = pc i+1 for 1 ≤ i < m (16) and ∀ pc z , pc w ∈ Pc : ∃ p 2 = pc z , . .…”
Section: A1 Generalisation Theoremmentioning
confidence: 99%
“…Model-based Management (MBM) [16,17] is a policy-based approach that employs an object-oriented layered model. It aims to provide a smooth transition from an abstract view of the system to be managed and the policies that apply to it down to reaching a detailed system representation at the most inferior layer.…”
Section: Previous Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In comparison to that, model-based management [6] uses very high-level policies to describe the desired behavior. Due to the utilization of a system model, the low-level policies and concrete service configurations can automatically be created by the tool.…”
Section: Model Structurementioning
confidence: 99%