Buscar
Mostrando ítems 1-10 de 12
Ponencia
Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates
(IEEE Computer Society, 2008)
Filtering is a very important issue in next generation networks. These networks consist of a relatively high number of resource constrained devices with very special features, such as managing frequent topology changes. ...
Ponencia
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business Processes
(Springer, 2012)
Risk management has become an essential mechanism for business and security analysts, since it enable the identification, evalu ation and treatment of any threats, vulnerabilities, and risks to which organizations maybe ...
Ponencia
Efficient algorithms and abstract data types for local inconsistency isolation in firewall ACLS
(Institute for Systems and Technologies of Information, Control and Communication (INSTICC), 2009)
Writing and managing firewall ACLs are hard, tedious, time-consuming and error-prone tasks for a wide range of reasons. During these tasks, inconsistent rules can be introduced. An inconsistent firewall ACL implies in ...
Artículo
CONFIDDENT: A model-driven consistent and non-redundant layer-3 firewall ACL design, development and maintenance framework
(Elsevier, 2012)
Design, development, and maintenance of firewall ACLs are very hard and error-prone tasks. Two of the reasons for these difficulties are, on the one hand, the big gap that exists between the access control requirements ...
Artículo
Towards the automatic and optimal selection of risk treatments for business processes using a constraint programming approach
(Elsevier, 2013)
Context: The use of Business Process Management Systems (BPMS) has emerged in the IT arena for the automation of business processes. In the majority of cases, the issue of security is overlooked by default in these systems, ...
Ponencia
AFPL2, An Abstract Language for Firewall ACLs with NAT support
(IEEE Computer Society, 2009)
The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-level language with a different functionality, ...
Artículo
Formalization of security patterns as a means to infer security controls in business processes
(Oxford University Press, 2015)
The growing trend towards the automation and externalization of business processes by means of Technology Infrastructure (TI), such as Business Process Management Systems, has increased the security risks in the organizations. ...
Ponencia
A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
(IEEE Computer Society, 2010)
Developing and managing firewall Access Control Lists (ACLs) are hard, time-consuming, and error-prone tasks for a variety of reasons. Complexity of networks is constantly increasing, as it is the size of firewall ...
Artículo
Fault Tolerance Framework using Model-Based Diagnosis: Towards Dependable Business Processes
(International Academy, Research, and Industry Association (IARIA), 2011)
Several reports indicate that one of the most important business priorities is the improvement of business and IT management. Management and automation of business processes have become essential tasks within IT ...
Ponencia
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
(IEEE Computer Society, 2008)
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied or vice versa. In this paper, we analyze ...