1. This paper constructs some logical formulas and uses CSP solver Sugar to verify them, the inconsistencies of SP and FP could be decided based on the ...
In this paper, we propose a method to detect and resolve inconsistencies of firewall policy and security policy. We have implemented a prototype system to ...
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active.
A Novel Management Framework for Policy Anomaly in Firewall · An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver.
An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver. Proc. of ICCCS2017, Part II, LNCS 10603.
Mar 14, 2024 · In this work, we use a formal technique to find and eliminate the inconsistencies between security policy and IPv6 firewall policy.
An inconsistency detection method for security policy and firewall policy based on CSP solver ; 巻: 10603 ; 号 ; 開始ページ: 147 ; 終了ページ: 161 ; 記述言語: 英語 ...
To resolve this problem, we propose a method that represents security policy and firewall policy as Constraint Satisfaction Problem and constructs a consistency ...
Then we construct a constraint satisfaction problem to detect and identify the possible inconsistencies between the specified policy and the firewall rule set.
Missing: Method | Show results with:Method
Because of their complexity, distribution and size, access control policies can contain anomalies such as inconsistencies, which can result in security ...
Missing: CSP | Show results with:CSP