Back to Results
First PageMeta Content
Security / Data security / Risk analysis / Vulnerability / Threat / Asset / Countermeasure / Firewall / Attack / Computer network security / Cyberwarfare / Computer security


An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley and William M. Fitzgerald Cork Constraint Computation Centre, Computer Science Department, University College Cork, Ireland s.foley
Add to Reading List

Document Date: 2009-07-27 08:02:51


Open Document

File Size: 223,93 KB

Share Result on Facebook

Company

Microsoft / Cisco / /

/

Facility

University College Cork / /

IndustryTerm

ne ss syn-cookie web server / database server / Web servers / e - commerce / Web Server / physical infrastructure / n-tier network / protection server / software tools / Web-server / Web Server solid-line / /

OperatingSystem

DoS / Linux / /

Organization

IFIP International Federation for Information Processing / Computer Science Department / William M. Fitzgerald Cork Constraint Computation Centre / /

Person

Simon N. Foley / William M. Fitzgerald Cork Constraint / /

Position

double arrow head / representative / security manager / /

Technology

HTTP / SSL / TCP/IP / Firewall / Linux / Web Server / VPN / /

SocialTag