Formal security policy implementations in network firewalls.

Article English OPEN
Macfarlane, Richard.; Buchanan, William J.; Ekonomou, Elias.; Uthmani, Omair.; Fan, Lu.; Lo, Owen.;
  • Publisher: Elsevier
  • Subject: Security policy | Firewalls | Policy enforcement | Firewall policy management systems | Policy visualisation | Reverse engineering security policies | 005.8 Data security | QA75 Electronic computers. Computer science | Cyber-security | Centre for Distributed Computing, Networking and Security | Information Society

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude... View more
Share - Bookmark