Journal ArticleDOI
Survey Paper: A survey on policy languages in network and security management
Weili Han,Chang Lei +1 more
TLDR
Current works are investigated, the key issues are discussed, and the future work of policy languages are outlined, especially for the network and security management.About:
This article is published in Computer Networks.The article was published on 2012-01-01. It has received 103 citations till now. The article focuses on the topics: Systems management & Network security policy.read more
Citations
More filters
Journal ArticleDOI
Permission based Android security: Issues and countermeasures
Zheran Fang,Weili Han,Yingjiu Li +2 more
TL;DR: This paper investigates the arising issues in Android security, including coarse granularity of permissions, incompetent permission administration, insufficient permission documentation, over-claim of permission, permission escalation attack, and TOCTOU (Time of Check to Time of Use) attack.
Journal ArticleDOI
An ecosystem for anomaly detection and mitigation in software-defined networking
TL;DR: This paper presents an SDN-based ecosystem that monitors network traffic and proactively detects anomalies which may impair proper network functioning and demonstrates that the approach can efficiently contribute to the network’s resilience.
Proceedings ArticleDOI
Generative policy model for autonomic management
Dinesh C. Verma,Seraphin Calo,Supriyo Chakraborty,Elisa Bertino,Christopher Williams,J. Tucker,Brian Rivera +6 more
TL;DR: This paper presents a new approach that employs policy structures that are more dynamic and contextual while still preserving the desired levels of control, thus allowing managed systems to take more autonomic decisions regarding their operations.
Proceedings ArticleDOI
Towards SLA Policy Refinement for QoS Management in Software-Defined Networking
Cristian Cleder Machado,Lisandro Zambenedetti Granville,Alberto Schaeffer-Filho,Juliano Araujo Wickboldt +3 more
TL;DR: This paper proposes a novel approach towards SLA policy refinement for Quality of Service (QoS) management (based on routing) in Software-Defined Networking that is capable of identifying the requirements and resources that need to be configured in accordance with SLA refinement, and can successfully configure and execute reactive dynamic actions for supporting dynamic infrastructure reconfiguration.
Journal ArticleDOI
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships
Rishikesh Sahay,Weizhi Meng,Daniel Alberto Sepúlveda Estay,Christian Damsgaard Jensen,Michael Bruhn Barfod +4 more
TL;DR: The CyberShip-IoT framework is proposed to provide a network level defense for the communication network component of ship systems and offers a high-level policy language and a translation mechanism for automated policy enforcement in the ship’s communication network.
References
More filters
Journal Article
Above the Clouds: A Berkeley View of Cloud Computing
Michael Armbrust,Armando Fox,Rean Griffith,Anthony D. Joseph,Randy H. Katz,Andy Konwinski,Gunho Lee,David A. Patterson,Ariel Rabkin,Ion Stoica,Matei Zaharia +10 more
TL;DR: This work focuses on SaaS Providers (Cloud Users) and Cloud Providers, which have received less attention than SAAS Users, and uses the term Private Cloud to refer to internal datacenters of a business or other organization, not made available to the general public.
Journal ArticleDOI
Role-based access control models
TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Journal ArticleDOI
Goal-directed requirements acquisition
TL;DR: An approach to requirements acquisition is presented which is driven by higher-level concepts that are currently not supported by existing formal specification languages, such as goals to be achieved, agents to be assigned, alternatives to be negotiated, etc.
Simple Network Management Protocol (SNMP)
TL;DR: This RFC is a re-release of RFC 1098, with a changed "Status of this Memo" section plus a few minor typographical corrections.
Book ChapterDOI
The Ponder Policy Specification Language
TL;DR: The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java.