scispace - formally typeset
Journal ArticleDOI

Survey Paper: A survey on policy languages in network and security management

Weili Han, +1 more
- 01 Jan 2012 - 
- Vol. 56, Iss: 1, pp 477-489
TLDR
Current works are investigated, the key issues are discussed, and the future work of policy languages are outlined, especially for the network and security management.
About
This article is published in Computer Networks.The article was published on 2012-01-01. It has received 103 citations till now. The article focuses on the topics: Systems management & Network security policy.

read more

Citations
More filters
Journal ArticleDOI

Permission based Android security: Issues and countermeasures

TL;DR: This paper investigates the arising issues in Android security, including coarse granularity of permissions, incompetent permission administration, insufficient permission documentation, over-claim of permission, permission escalation attack, and TOCTOU (Time of Check to Time of Use) attack.
Journal ArticleDOI

An ecosystem for anomaly detection and mitigation in software-defined networking

TL;DR: This paper presents an SDN-based ecosystem that monitors network traffic and proactively detects anomalies which may impair proper network functioning and demonstrates that the approach can efficiently contribute to the network’s resilience.
Proceedings ArticleDOI

Generative policy model for autonomic management

TL;DR: This paper presents a new approach that employs policy structures that are more dynamic and contextual while still preserving the desired levels of control, thus allowing managed systems to take more autonomic decisions regarding their operations.
Proceedings ArticleDOI

Towards SLA Policy Refinement for QoS Management in Software-Defined Networking

TL;DR: This paper proposes a novel approach towards SLA policy refinement for Quality of Service (QoS) management (based on routing) in Software-Defined Networking that is capable of identifying the requirements and resources that need to be configured in accordance with SLA refinement, and can successfully configure and execute reactive dynamic actions for supporting dynamic infrastructure reconfiguration.
Journal ArticleDOI

CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships

TL;DR: The CyberShip-IoT framework is proposed to provide a network level defense for the communication network component of ship systems and offers a high-level policy language and a translation mechanism for automated policy enforcement in the ship’s communication network.
References
More filters
Journal Article

Above the Clouds: A Berkeley View of Cloud Computing

TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Journal ArticleDOI

Role-based access control models

TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Journal ArticleDOI

Goal-directed requirements acquisition

TL;DR: An approach to requirements acquisition is presented which is driven by higher-level concepts that are currently not supported by existing formal specification languages, such as goals to be achieved, agents to be assigned, alternatives to be negotiated, etc.

Simple Network Management Protocol (SNMP)

TL;DR: This RFC is a re-release of RFC 1098, with a changed "Status of this Memo" section plus a few minor typographical corrections.
Book ChapterDOI

The Ponder Policy Specification Language

TL;DR: The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java.
Related Papers (5)