Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A model transformation based security policy automatic management framework for software-defined networking
Y Meng, C Ke, Z Huang - Computers & Security, 2024 - Elsevier
Software-defined networking (SDN) has been utilized to enforce the security of traditional
networks. However, the existing SDN-based security enforcement mechanisms rely heavily …
networks. However, the existing SDN-based security enforcement mechanisms rely heavily …
A classification-based approach to policy refinement
Systems are typically designed based on certain high level goals, such as performance and
availability. On the other hand, during operation, usually only low level metrics (eg, CPU …
availability. On the other hand, during operation, usually only low level metrics (eg, CPU …
Model-based safety analysis of SELinux security policies
P Amthor, WE Kühnhauser… - 2011 5th International …, 2011 - ieeexplore.ieee.org
Since security has become an essential asset in numerous application areas, the integration
of security policies has become a major issue in the design of security architectures, and …
of security policies has become a major issue in the design of security architectures, and …
Formal validation of automated policy refinement in the management of network security systems
Policy hierarchies and automated policy refinement are powerful approaches to simplify
administration of security services in complex network environments. A crucial issue for the …
administration of security services in complex network environments. A crucial issue for the …
A security policy model transformation and verification approach for software defined networking
Y Meng, Z Huang, G Shen, C Ke - Computers & Security, 2021 - Elsevier
Software-defined networking (SDN) has been increasingly utilized to enforce the security of
complex networks. However SDN-based security enforcement mechanisms rely heavily on …
complex networks. However SDN-based security enforcement mechanisms rely heavily on …
Improving the configuration management of large network security systems
JP de Albuquerque, H Isenberg, H Krumm… - Ambient Networks: 16th …, 2005 - Springer
The security mechanisms employed in today's networked environments are increasingly
complex and their configuration management has an important role for the protection of …
complex and their configuration management has an important role for the protection of …
Autonomic policy-based HAN traffic classification using augmented meta model for policy translation
Translating between network management policies is desirable if a system needs to map
downwards from a high-level objective to low-level configurations or to feed information …
downwards from a high-level objective to low-level configurations or to feed information …
On scalability and modularisation in the modelling of network security systems
As the use of computers and data communication technologies spreads, network security
systems are becoming increasingly complex, due to the incorporation of a variety of …
systems are becoming increasingly complex, due to the incorporation of a variety of …
A Practical Runtime Security Policy Transformation Framework for Software Defined Networks
Y Meng, C Ke, Z Huang, G Shen, C Liu… - arxiv preprint arxiv …, 2023 - arxiv.org
Software-defined networking (SDN) has been widely utilized to enforce the security of
traditional networks, thereby promoting the process of transforming traditional networks into …
traditional networks, thereby promoting the process of transforming traditional networks into …
[CITAS][C] Conceptual model and realization methods of autonomic computing
廖备水, **石坚, 姚远, 高济 - Journal of Software, 2008