Multi-constraint security policies for delegated firewall administration.
Cássio Ditzel KropiwiecEdgard JamhourManoel Camillo PennaGuy PujollePublished in: Int. J. Netw. Manag. (2011)
Keyphrases
- security policies
- network security
- access control
- unauthorized access
- security management
- security requirements
- distributed systems
- access control systems
- security concerns
- intrusion detection system
- access control policies
- network traffic
- packet filtering
- intrusion detection
- distributed environment
- multilevel secure
- information security
- resource constraints
- anomaly detection
- fine grained
- cyber attacks
- relational databases
- information systems
- machine learning