Aggregating and Deploying Network Access Control Policies

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

9 pages

Scientific paper

The existence of errors or inconsistencies in the configuration of security components, such as filtering routers and/or firewalls, may lead to weak access control policies -- potentially easy to be evaded by unauthorized parties. We present in this paper a proposal to create, manage, and deploy consistent policies in those components in an efficient way. To do so, we combine two main approaches. The first approach is the use of an aggregation mechanism that yields consistent configurations or signals inconsistencies. Through this mechanism we can fold existing policies of a given system and create a consistent and global set of access control rules -- easy to maintain and manage by using a single syntax. The second approach is the use of a refinement mechanism that guarantees the proper deployment of such a global set of rules into the system, yet free of inconsistencies.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Aggregating and Deploying Network Access Control Policies does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Aggregating and Deploying Network Access Control Policies, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Aggregating and Deploying Network Access Control Policies will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-161211

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.