Localizing Firewall Security Policies.
Pedro AdãoRiccardo FocardiJoshua D. GuttmanFlaminia L. LuccioPublished in: CSF (2016)
Keyphrases
- security policies
- network security
- unauthorized access
- packet filtering
- intrusion detection
- access control
- computer networks
- intrusion detection system
- network traffic
- security management
- security requirements
- security concerns
- distributed systems
- information security
- access control systems
- access control policies
- home network
- anomaly detection
- cyber attacks
- multilevel secure
- model based testing