Buscar
Mostrando ítems 11-20 de 23
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Análisis y visualización de comunidades científicas con información extraida de la web
(IEEE Computer Society, 2005)
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
(IEEE Computer Society, 2010)
Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly increasing, as it is the size of firewall ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Model-Based Development of firewall rule sets: Diagnosing model inconsistencies
(Elsevier, 2009)
The design and management of firewall rule sets is a very difficult and error-prone task because of the difficulty of translating access control requirements into complex low-level firewall languages. Although high-level ...
Artículo
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Fault Tolerance Framework using Model-Based Diagnosis: Towards Dependable Business Processes
(International Academy, Research, and Industry Association (IARIA), 2011)
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. Management and automation of business processes have become essential tasks within IT ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
An Integration of FDI and DX Techniques for Determining the Minimal Diagnosis in an Automatic Way
(Springer, 2005)
Two communities work in parallel in model-based diagnosis: FDI and DX. In this work an integration of the FDI and the DX communities is proposed. Only relevant information for the identification of the minimal diagnosis ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
(IEEE Computer Society, 2008)
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied or vice versa. In this paper, we analyze ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Securing Mobile Agent Based Tele-Assistance Systems
(SciTePress, 2004)
Nowadays the scientific community is trying to design new techniques in the search for solving security problems in mobile agent technology. There are now some industry initiatives for using agents in real environments ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
Fast algorithms for consistency-based diagnosis of firewall rule sets
(IEEE Computer Society, 2008)
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACL management suffer some problems that need to be addressed in order to be effective. The most studied one is ...
Ponencia
![Con acceso al texto completo Icon](/themes/idUS//images/acceso/opened_access.png)
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
(Springer, 2009)
The design and management of firewall ACLs is a very hard and er ror-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, ...