Academic literature on the topic 'Protection policy,policy anomalies, policy conflicts, network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protection policy,policy anomalies, policy conflicts, network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protection policy,policy anomalies, policy conflicts, network security"

1

Darade, R.V., and P.B. Kumbharkar. "Firewall policy anomaly detection and resolution." COMPUSOFT: An International Journal of Advanced Computer Technology 03, no. 06 (2014): 879–83. https://doi.org/10.5281/zenodo.14742678.

Full text
Abstract:
Security of all private networks in businesses and institutions is achieved by firewall. Firewall provides protection by the quality of policy configured. Lack of Systematic analysis mechanism and Tools, Complex firewall configuration makes designing and managing firewall policies difficult. With help of segmentation rule, anomaly management framework is designed for accurate detection and effective resolution of anomalies. Using this technique, packets of network can be divided into set of disjoint packet space segments. Every segment is associated with unique set of firewall rules which spec
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Weiyuan. "Legal Effect of Internet Privacy Policy." Journal of Education, Humanities and Social Sciences 28 (April 1, 2024): 126–33. http://dx.doi.org/10.54097/zjz34p19.

Full text
Abstract:
The legal effect of Internet privacy policies is self-evident in protecting users’ personal privacy. However, in practical applications, the implementation of privacy policies faces many challenges. First, conflicts between commercial interests and privacy protection often arise, and network service providers may infringe on user privacy in pursuit of commercial interests. Secondly, considerations of national security and social stability may also conflict with the protection of personal privacy. Network service providers may need to cooperate with the investigation and regulatory requirements
APA, Harvard, Vancouver, ISO, and other styles
3

Molina Zarca, Alejandro, Miloud Bagaa, Jorge Bernal Bernabe, Tarik Taleb, and Antonio F. Skarmeta. "Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems." Sensors 20, no. 13 (2020): 3622. http://dx.doi.org/10.3390/s20133622.

Full text
Abstract:
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience. In this sense, adaptive and policy-based security frameworks for SDN/NFV-aware IoT systems can provide a remarkable added value for self-protection and self-healing, by orchestrating and enforcing dynamically security policies and associated Virtual Network Functions (VNF) or Virtual network Security Functions (VSF) according to the actual context. However, this security orchestration is subject to mu
APA, Harvard, Vancouver, ISO, and other styles
4

Sunday Adeola Oladosu, Adebimpe Bolatito Ige, Christian Chukwuemeka Ike, Peter Adeyemo Adepoju, Olukunle Oladipupo Amoo, and Adeoye Idowu Afolabi. "Next-generation network security: conceptualizing a Unified, AI-Powered Security Architecture for Cloud-Native and On-Premise Environments." International Journal of Science and Technology Research Archive 3, no. 2 (2022): 270–80. https://doi.org/10.53771/ijstra.2022.3.2.0143.

Full text
Abstract:
The increasing complexity and interconnectivity of modern IT infrastructures, including both cloud-native and on-premise environments, present significant challenges for traditional network security models. As organizations adopt hybrid cloud architectures and expand their reliance on cloud-native technologies, ensuring robust security across diverse environments becomes essential. This review proposes a conceptual framework for next-generation network security, centered around a unified, AI-powered architecture that seamlessly integrates cloud-native and on-premise systems. By leveraging arti
APA, Harvard, Vancouver, ISO, and other styles
5

Pankova, L. I., S. M. Milnichenko, and D. A. Uzbek. "NATIONAL ECONOMIC INTERESTS OF UKRAINE IN THE CONDITIONS OF INNOVATIVE ECONOMY FORMATION." Proceedings of Scientific Works of Cherkasy State Technological University Series Economic Sciences, no. 63 (December 21, 2021): 5–13. http://dx.doi.org/10.24025/2306-4420.63.2021.248569.

Full text
Abstract:
The article outlines key issues that need to be accelerated in the direction of national interests positioning in the formation of an innovative economy, including: assessing the priority of economic interests and conflicts that need to be resolved from the standpoint of further improving economic and social relations, involving regulatory practices both state and regional strategizing and formation of active European models of innovative development, protection of the national producer in the conditions of open markets, increase of positive shifts potential in maintenance of national security
APA, Harvard, Vancouver, ISO, and other styles
6

Zaman, Maheen. "Jihad & Co.: Black Markets and Islamist Power." American Journal of Islamic Social Sciences 35, no. 3 (2018): 104–7. http://dx.doi.org/10.35632/ajiss.v35i3.490.

Full text
Abstract:
In this critically insightful and highly readable book of political ethnogra- phy, Aisha Ahmad, a political scientist at University of Toronto, seeks to explain how and why Islamist movements continue to militarily prevail and politically succeed in forming proto-states, over clan, ethnic, and/or tribal based competitions, amidst the chaos and disorder of civil wars across the contemporary Muslim world, from Mali to Mindanao. To this end, Ahmad seeks to go beyond the usual expositions that center the explanatory power of Islamist ideologies and identities, which dominate the scholarly fields o
APA, Harvard, Vancouver, ISO, and other styles
7

Zaman, Maheen. "Jihad & Co.: Black Markets and Islamist Power." American Journal of Islam and Society 35, no. 3 (2018): 104–7. http://dx.doi.org/10.35632/ajis.v35i3.490.

Full text
Abstract:
In this critically insightful and highly readable book of political ethnogra- phy, Aisha Ahmad, a political scientist at University of Toronto, seeks to explain how and why Islamist movements continue to militarily prevail and politically succeed in forming proto-states, over clan, ethnic, and/or tribal based competitions, amidst the chaos and disorder of civil wars across the contemporary Muslim world, from Mali to Mindanao. To this end, Ahmad seeks to go beyond the usual expositions that center the explanatory power of Islamist ideologies and identities, which dominate the scholarly fields o
APA, Harvard, Vancouver, ISO, and other styles
8

KUMAR, MS KRUTHI K., MRS SHANTHI M.B., and DR JITENDRANATH MUNGARA. "MANAGING REDUNDANCY AND CONFLICTS IN DISTRIBUTED FIREWALLS." International Journal of Computer Science and Informatics, October 2014, 120–25. http://dx.doi.org/10.47893/ijcsi.2014.1184.

Full text
Abstract:
The use of firewall has been widespread in all the emerging technologies such as Service Oriented Architecture, web services, cloud computing and so on. The term security itself is the most important task that has to be maintained in the real-time applications. Policies are enrolled in the security of the firewall where the quality of policies is to be maintained. The network administrator defines the policy as a rule. Managing the firewall policies, maintaining the risk analysis and also the conflicting nature that arise in the network, lack of systematic analysis mechanisms and tools used ar
APA, Harvard, Vancouver, ISO, and other styles
9

Makoshi, Stephen Mikah. "Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms By Stephen Mikah Makoshi May, 2025." May 14, 2025. https://doi.org/10.5281/zenodo.15412985.

Full text
Abstract:
<strong><em>Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms</em></strong> <strong>Author</strong>: Stephen Mikah Makoshi <strong>Publication Date</strong>: May 2025 <strong>Overview</strong> The manuscript <em>Cyber Warfare and Nation-State Attack: Investigating Tactics, Techniques, and Procedures (TTPs) of State-Sponsored Cyberattacks and Defense Mechanisms</em>, authored by Stephen Mikah Makoshi, is a rigorous and timely exploration of the escalating domain of cyber warfare, focusing on sta
APA, Harvard, Vancouver, ISO, and other styles
10

Holloway, Donell Joy, Catherine Archer, and Michele Willson. "ENTRUSTING CHILDREN'S DATA." AoIR Selected Papers of Internet Research 2019 (October 31, 2019). http://dx.doi.org/10.5210/spir.v2019i0.10970.

Full text
Abstract:
This panel is devoted to the issue of trust and children’s data. Trust in the ethical treatment of children’s data relies on a broad balance of trust in a complex network of actors and practices involved in data collection, analytics, sharing and use of children’s data. More specifically, trust in how data is captured, who the data is captured by, what is done to the data and how outcomes generated out of the data are employed needs to be guaranteed. We discuss the predictive practices (algorithmic analysis) used to uncover behaviours, characteristics and relationships in order to anticipate o
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Protection policy,policy anomalies, policy conflicts, network security"

1

VALENZA, FULVIO. "Modelling and Analysis of Network Security Policies." Doctoral thesis, Politecnico di Torino, 2017. http://hdl.handle.net/11583/2676486.

Full text
Abstract:
Nowadays, computers and network communications have a pervasive presence in all our daily activities. Their correct configuration in terms of security is becoming more and more complex due to the growing number and variety of services present in a network. Generally, the security configuration of a computer network is dictated by specifying the policies of the security controls (e.g. firewall, VPN gateway) in the network. This implies that the specification of the network security policies is a crucial step to avoid errors in network configuration (e.g., blocking legitimate traffic, permitt
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protection policy,policy anomalies, policy conflicts, network security"

1

W, Wilfred Wessely, and Sujitha R. "Photochain: A Blockchain Based Secure Photo Sharing Framework for Cross-Social Network." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/quqs5012/ngcesi23p68.

Full text
Abstract:
Social Networks is one of the major technological phenomena on the Web 2.0. The evolution of social media has led to a trend of posting daily photos on online Social Network Platforms (SNPs). The privacy of online photos is often protected carefully by security mechanisms. However, these mechanisms will lose effectiveness when someone spreads the photos to other platforms. Photo Chain, a blockchain-based secure photo sharing framework that provides powerful dissemination control for cross-SNP photo sharing. In contrast to security mechanisms running separately in centralized servers that do no
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!