Title
Dealing with Multi Security Policies in Communication Networks
Abstract
In any organization, there are generally several applications in place and usually, each application has its own Security Policy. In fact, the ability to define multiple Security Policies is needed in several cases. Moreover, heterogeneous security mechanisms can be used to achieve security objectives. However, implementing a unified security policy for all theses mechanisms becomes then unfeasible. Hence, a formal representation of security policies is needed. Furthermore, since theses policies are generally written by different people, they may have conflicts. The main contribution of this paper concerns then, the formalization of security policies conflicts as well as their detection and resolution.
Year
DOI
Venue
2009
10.1109/ICNS.2009.24
ICNS
Keywords
Field
DocType
multi security policies,unified security policy,security policies conflict,communication networks,theses policy,different people,security policy,security objective,theses mechanism,multiple security policies,own security policy,heterogeneous security mechanism,information security,silicon,combination,probability density function,communication network,data mining,security
Security convergence,Security through obscurity,Information security standards,Computer science,Asset (computer security),Computer security,Computer network,Security service,Cloud computing security,Security information and event management,Computer security model,Distributed computing
Conference
Citations 
PageRank 
References 
3
0.49
14
Authors
2
Name
Order
Citations
PageRank
Ryma Abassi12410.45
Sihem Guemara El Fatmi24013.24