| Document Date: 2015-02-16 02:27:52 Open Document File Size: 112,71 KBShare Result on Facebook
City Trento / Heraklion / Dresden / Dijon / Perth / Fortaleza / Boston / Bristol / Guilin / Washington / DC / Fukushimna / Athens / Vancouver / Beijing / Miami / Bologna / Sousse / Oakland / San Jose / Florence / / Company AlgoSec Inc. / Distributed Systems / Cisco / Las Vegas NV / IEEE Journal / / Country Germany / Italy / Tunisia / France / Japan / Brazil / Canada / United Kingdom / China / Greece / / / Facility Port Translation / / IndustryTerm conflict analysis tool / firewall verification tool / connectionless and connection-oriented protocols / few enterprise grade products / black box policy generation tool / network security management / proposed algorithmic solution / real network / policy refinement tool / intrusion detection systems / automated tools / Online reachability analysis / network intrusion detection systems / software modules / policy analysis solutions / connection-oriented transport protocols / comparison algorithm / transformation technologies / target network / network operators / policy management / deployed systems / computer network / Internet Technology / allowed communications / Internet Computing / computer networks / policy comparison tool / deployed devices / reachability analysis tool / graph-based algorithms / policy generation tools / computing / detection algorithm / security devices / application layer protocols / / Organization Politecnico di Torino / European Commission / / Person N. B. Youssef / N. Ben Youssef / A. Bouhoula / F. Jacquemard / Algosec / / Position model Network Address Translation / leader in network security management / similar detection classification model for IPsec security policy conflicts / network administrator / Floyd-Marshall / administrator / Firewall Policy Advisor / entity-relationship model of the security policy / FIREMAN / / ProgrammingLanguage FL / / ProvinceOrState Washington / Florida / California / Massachusetts / Colorado / / PublishedMedium IEEE Communications Magazine / / Technology application layer protocols / connectionless and connection-oriented protocols / VPN / connection-oriented transport protocols / encryption / firewall / comparison algorithm / Network Address Translation / transformation technologies / graph-based algorithms / VPN routers / detection algorithm / presented algorithms / /
SocialTag |