Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies 2018
DOI: 10.1145/3205977.3206000
|View full text |Cite
|
Sign up to set email alerts
|

Network Policy Enforcement Using Transactions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 9 publications
0
8
0
Order By: Relevance
“…Good design takes security, ease of access, and usability into account, striking a balance between protecting the system and ease of use. Good practice has evolved a number of practical approaches like minimizing attack surface area [7], establish secure defaults [8], using the principle of defence in depth [9], not trusting services [10], keeping security simple [11], and fixing security issues correctly [12].These approaches are used for maintaining and improving security which are so natural and important that they should be adopted as a first layer of protection as a matter of standard practice, even when more sophisticated approaches are also in use [13].…”
Section: A Good Security Design Practicementioning
confidence: 99%
“…Good design takes security, ease of access, and usability into account, striking a balance between protecting the system and ease of use. Good practice has evolved a number of practical approaches like minimizing attack surface area [7], establish secure defaults [8], using the principle of defence in depth [9], not trusting services [10], keeping security simple [11], and fixing security issues correctly [12].These approaches are used for maintaining and improving security which are so natural and important that they should be adopted as a first layer of protection as a matter of standard practice, even when more sophisticated approaches are also in use [13].…”
Section: A Good Security Design Practicementioning
confidence: 99%
“…Network functionalities include not only the communication expected by a user but many unexpected communications. For example, booking an Uber ride contacts at least eight different hosts on the Internet and network support functions [34].…”
Section: Introductionmentioning
confidence: 99%
“…However, busy network administrators find detailed permission management a daunting and time-consuming task [34]. First, the communication requirements of assets (e.g., services, devices, virtual and cloud components, applications, infrastructure components) and users need to be well understood.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations