Sciweavers

18697 search results - page 96 / 3740
» Systemic Security Management
Sort
View
GLOBECOM
2007
IEEE
15 years 10 months ago
Passive Listening and Intrusion Management in Commodity Wi-Fi Networks
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
ETRICS
2006
15 years 8 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
LISA
2007
15 years 6 months ago
PolicyVis: Firewall Security Policy Visualization and Inspection
Firewalls have an important role in network security. However, managing firewall policies is an extremely complex task because the large number of interacting rules in single or d...
Tung Tran, Ehab S. Al-Shaer, Raouf Boutaba
ACSAC
2001
IEEE
15 years 8 months ago
The Authorization Service of Tivoli Policy Director
This paper presents the Authorization Service provided by Tivoli Policy Director (PD) and its use by PD family members as well as third-party applications. Policies are defined ov...
Günter Karjoth
IWSOS
2007
Springer
15 years 10 months ago
A Self-organizing Control Plane for Failure Management in Transparent Optical Networks
Self-organizing systems are present in many areas of nature and science, and have more recently been increasingly applied to telecommunications. These systems often exhibit common ...
Nina Skorin-Kapov, Nicolas Puech