Reliable process for security policy deployment

S Preda, N Cuppens-Boulahia, F Cuppens… - arxiv preprint arxiv …, 2009 - arxiv.org
We focus in this paper on the problem of configuring and managing network security
devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection …

Distributed control enabling consistent MAC policies and IDS based on a meta-policy approach

M Blanc, J Briffaur, JJ Lalande… - … Workshop on Policies …, 2006 - ieeexplore.ieee.org
This paper presents a new framework based on a meta-policy linked to a new intrusion
detection approach. It deploys a MAC kernel within a distributed system while guaranteeing …

Collaboration between MAC policies and ids based on a meta-policy approach

M Blanc, J Briffaut, C Toinard - International Symposium on …, 2006 - ieeexplore.ieee.org
This paper1 presents a new infrastructure based on a novel meta-policy approach. This
solution allows to deploy a MAC kernel within a distributed system. It is a completely …

Intrusion detection and security policy framework for distributed environments

AA El Kalam, J Briffaut, C Toinard… - Proceedings of the 2005 …, 2005 - ieeexplore.ieee.org
This paper presents a novel intrusion detection approach and a new infrastructure to enforce
the security policy within a distributed system. The solution guarantees the consistency of …

Efficient static checking of dynamic access control in shared multiprocessor environments

G Hains - 2007 International Symposium on Collaborative …, 2007 - ieeexplore.ieee.org
Large parallel-processing systems are necessary for the highest performance levels but
economically wasteful if the investment in hardware, building space, electricity and …