Sciweavers

1167 search results - page 33 / 234
» policy 2007
Sort
View
IM
2007
14 years 3 days ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
DGO
2007
123views Education» more  DGO 2007»
14 years 4 days ago
Cross-national information policy conflict regarding access to information: building a conceptual framework
This paper addresses cross-national information policy conflict regarding access to information. This type of information policy conflict appears more complex and controversial th...
Lei Zheng
HICSS
2007
IEEE
114views Biometrics» more  HICSS 2007»
14 years 5 months ago
A History of Indonesian Telecommunication Reform 1999-2006
This study examines the effect of Indonesia’s telecommunications policy on Internet access and the digital divide. The study finds that current government policy had minimal imp...
Susan Eick
IEEEARES
2007
IEEE
14 years 5 months ago
CSP-Based Firewall Rule Set Diagnosis using Security Policies
The most important part of a firewall configuration process is the implementation of a security policy by a security administrator. However, this security policy is not designed b...
Sergio Pozo, Rafael Ceballos, Rafael M. Gasca
CIS
2007
Springer
14 years 4 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang