Security Policy Automation-from Specification to Device Configuration (original) (raw)

A Security Policy Infrastructure for Tactical Service Oriented Architectures

Joaquin Garcia-Alfaro

Security of Industrial Control Systems and Cyber-Physical Systems, 2017

View PDFchevron_right

Policy Technologies for Security Management in Coalition Networks

Arosha Bandara

Concepts, Methodologies, Tools and Applications (4 Volumes)

View PDFchevron_right

Dynamic Deployment and Monitoring of Security Policies

José Miguel Horcas Aguilera

Trust, Privacy and Security in Digital Business, 2015

View PDFchevron_right

Reliable Process for Security Policy Deployment

Joaquin Alfaro

View PDFchevron_right

11TH INTERNATIONAL COMMAND AND CONTROL RESEARCH AND TECHNOLOGY SYMPOSIUM -- COALITION COMMAND AND CONTROL IN THE NETWORKED ERA Modeling Security Architectures for the Enterprise STUDENT PAPER

John Colombi

View PDFchevron_right

Analysis and Run-Time Verification of Dynamic Security Policies

Francois Siewe

Defence Applications of …, 2006

View PDFchevron_right

An approach for deploying and monitoring dynamic security policies

José Miguel Horcas Aguilera

Computers & Security, 2016

View PDFchevron_right

A Policy-Driven Network Management System for the Dynamic Configuration of Military Networks

Wei Koong Chai

Lecture Notes in Computer Science, 2009

View PDFchevron_right

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

faten labbene

Security and Communication Networks

View PDFchevron_right

The MILS component integration approach to secure information sharing

Rance DeLong

2008 IEEE/AIAA 27th Digital Avionics Systems Conference, 2008

View PDFchevron_right

Dynamic deployment of context-aware access control policies for constrained security devices

Joaquin Alfaro

Journal of Systems and Software, 2011

View PDFchevron_right

A CIM Based security policy refinement process from security objectives to concrete configurations

Anas Abou El Kalam

View PDFchevron_right

Security architecture for tactical/strategic interoperability

mark dark

Proceedings of TCC'94 - Tactical Communications Conference

View PDFchevron_right

Security Policies in Military Environments

Sašo Tomažič

View PDFchevron_right

Towards network security policy generation for configuration analysis and testing

Ehab Al-Shaer

2009

View PDFchevron_right

Representation and evaluation of security policies

Tatyana Ryutov

Operating Systems Review, 2000

View PDFchevron_right

Semantic context aware security policy deployment

Geo Alfaro

2009

View PDFchevron_right

Model-Driven Security Policy Deployment: Property Oriented Approach

Joaquin Alfaro

Lecture Notes in Computer Science, 2010

View PDFchevron_right

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment

Alberto Filho

2008

View PDFchevron_right

Review of security policy Implementations

Omair Uthmani

2011

View PDFchevron_right

The Specification and Enforcement of Advanced Security Policies

Tatyana Ryutov

2002

View PDFchevron_right

Distributed security policy conformance

Kevin Larson

Future Challenges in Security and Privacy for Academia and Industry, 2011

View PDFchevron_right

Dynamic Policy-Based Network Management for a Secure Coalition Environment

Antonio Skarmeta

IEEE Communications Magazine, 2006

View PDFchevron_right

Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement

Roberto Carbone

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Improving the Configuration Management of Large Network Security Systems

João Porto de Albuquerque

2005

View PDFchevron_right