Security Policy Automation-from Specification to Device Configuration (original) (raw)
Related papers
A Security Policy Infrastructure for Tactical Service Oriented Architectures
Security of Industrial Control Systems and Cyber-Physical Systems, 2017
Policy Technologies for Security Management in Coalition Networks
Concepts, Methodologies, Tools and Applications (4 Volumes)
Dynamic Deployment and Monitoring of Security Policies
Trust, Privacy and Security in Digital Business, 2015
Reliable Process for Security Policy Deployment
Analysis and Run-Time Verification of Dynamic Security Policies
Defence Applications of …, 2006
An approach for deploying and monitoring dynamic security policies
Computers & Security, 2016
A Policy-Driven Network Management System for the Dynamic Configuration of Military Networks
Lecture Notes in Computer Science, 2009
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
Security and Communication Networks
The MILS component integration approach to secure information sharing
2008 IEEE/AIAA 27th Digital Avionics Systems Conference, 2008
Dynamic deployment of context-aware access control policies for constrained security devices
Journal of Systems and Software, 2011
A CIM Based security policy refinement process from security objectives to concrete configurations
Security architecture for tactical/strategic interoperability
Proceedings of TCC'94 - Tactical Communications Conference
Security Policies in Military Environments
Towards network security policy generation for configuration analysis and testing
2009
Representation and evaluation of security policies
Operating Systems Review, 2000
Semantic context aware security policy deployment
2009
Model-Driven Security Policy Deployment: Property Oriented Approach
Lecture Notes in Computer Science, 2010
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment
2008
Review of security policy Implementations
2011
The Specification and Enforcement of Advanced Security Policies
2002
Distributed security policy conformance
Future Challenges in Security and Privacy for Academia and Industry, 2011
Dynamic Policy-Based Network Management for a Secure Coalition Environment
IEEE Communications Magazine, 2006
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement
Lecture Notes in Computer Science, 2011
Improving the Configuration Management of Large Network Security Systems
2005