Multi-constraint Security Policies for Delegated Firewall Administration.
Cássio Ditzel KropiwiecEdgard JamhourManoel Camillo PennaGuy PujollePublished in: DSOM (2008)
Keyphrases
- security policies
- network security
- access control
- unauthorized access
- security management
- intrusion detection
- security requirements
- intrusion detection system
- security concerns
- computer networks
- network traffic
- packet filtering
- access control systems
- distributed environment
- distributed systems
- multilevel secure
- anomaly detection
- cyber attacks
- rbac model