Macfarlane, Richard, Buchanan, William J, Ekonomou, Elias, Uthmani, Omair, Fan, Lu and Lo, Owen (2011) Formal security policy implementations in network firewalls. Computers & Security, 31 (2). pp. 253-270. ISSN 01674048
Available under License Creative Commons Attribution Non-commercial.
Download (1393kB) | Preview
Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper provides an overview of the different type of policies relating to security in networks, and a taxonomy of the research into systems which have been proposed to support the network administrators in difficult tasks of creating, managing and deploying these policies.
|Uncontrolled Keywords:||Security policy; Firewalls; Policy enforcement; Firewall policy management systems; Policy visualisation; Reverse engineering security policies|
|University Divisions/Research Centres:||Edinburgh Napier University, Institute for Informatics and Digital Innovation|
|Dewey Decimal Subjects:||000 Computer science, information & general works > 000 Computer science, knowledge & systems > 005 Computer programming, programs & data > 005.8 Data security|
|Library of Congress Subjects:||Q Science > QA Mathematics > QA75 Electronic computers. Computer science|
|Depositing User:||Computing Research|
|Date Deposited:||30 May 2011 15:10|
|Last Modified:||29 Nov 2012 10:48|
Actions (login required)