Buscar
Mostrando ítems 1-10 de 21
Ponencia
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
(IEEE Computer Society, 2008)
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, such as managing frequent topology changes. ...
Ponencia
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
(Springer, 2012)
Risk management has become an essential mechanism for business and security analysts, since it enable the identification, evalu ation and treatment of any threats, vulnerabilities, and risks to which organizations maybe ...
Ponencia
Efficient algorithms and abstract data types for local inconsistency isolation in firewall ACLS
(Institute for Systems and Technologies of Information, Control and Communication (INSTICC), 2009)
Writing and managing firewall ACLs are hard, tedious, time-consuming and error-prone tasks for a wide range of reasons. During these tasks, inconsistent rules can be introduced. An inconsistent firewall ACL implies in ...
Ponencia
A heuristic polynomial algorithm for local inconsistency diagnosis in firewall rule sets
(SciTePress, 2008)
Firewall ACLs can contain inconsistencies. There is an inconsistency if different actions can be taken on the same flow of traffic, depending on the ordering of the rules. Inconsistent rules should be notified to the system ...
Ponencia
Diagnosing Business Processes Execution using Choreography Analysis
(Asociación de Ingeniería del Software y Tecnologías de Desarrollo de Software (SISTEDES), 2008)
This work presents a proposal to diagnose business processes that form a global process using a choreography analysis. The diagnosis is based on distributed diagnosis since the business process is formed by a process ...
Artículo
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
(Elsevier, 2012)
Design, development, and maintenance of firewall ACLs are very hard and error-prone tasks. Two of the reasons for these difficulties are, on the one hand, the big gap that exists between the access control requirements ...
Ponencia
NMUS: Structural Analysis for Improving the Derivation of All MUSes in Overconstrained Numeric CSPs
(Springer, 2007)
Models are used in science and engineering for experimentation, analysis, model-based diagnosis, design and planning/sheduling applications. Many of these models are overconstrained Numeric Constraint Satisfaction ...
Artículo
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
(Elsevier, 2013)
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, ...
Ponencia
Choreography Analysis for Diagnosing Faulty Activities in Business-to-Business Collaboration
(Linköping University, 2009)
The interaction between business processes (BPs) by means of a choreography is considered as a Business-to-Business Collaboration (B2BC). This work presents a proposal to diagnose faulty activities in B2BC using choreography ...
Ponencia
AFPL2, An Abstract Language for Firewall ACLs with NAT support
(IEEE Computer Society, 2009)
The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, ...