Firewall Configuration based on Specifications of Access Policy and Network Environment.
Anton TitovVladimir S. ZaborovskyPublished in: Security and Management (2010)
Keyphrases
- network traffic
- mobile robot
- packet filtering
- network model
- computer networks
- network configuration
- wireless sensor networks
- mobile sensor
- communication links
- network access
- network structure
- network architecture
- network security
- high level
- reactive systems
- exchange information
- complex networks
- intrusion detection
- neural network
- communication networks
- information security
- optimal policy
- single user
- dynamic environments
- computer systems
- access control
- peer to peer
- policy enforcement