EOrBAC Based Network Security Management Toolkit

被引:0
|
作者
Hassan, Ahmad A. [1 ]
Bahgat, Waleed M. [2 ]
Ibrahim, Abdel Fatah [3 ]
机构
[1] Taibah Univ, Dept Comp Sci & Informat, Al Medina Al Munawara, Saudi Arabia
[2] Misr Engn & Technol Inst, Dept Commun, Mansoura, Egypt
[3] Mansoura Univ, Commun & Elect Engn Dept, Mansoura, Egypt
关键词
Network security; Security modeling; Security policy; Security mangement; OrBAC model;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because of the growing complexity of networks and the difficult task of security policy enforcement, system administrators need simple and powerful security management tools. This paper presents a network security management tool that allows policy specification and administration of network security components such as firewall. The tool consists of four main modules. First module is considered the network repository of our toolkit. Through the second module the security policy is introduced and the necessary validation and verification is done by a policy engine. The third module is responsible for the translation of the high level security policy into an intermediate model level. Finally, the intermediate level is translated automatically into a vendor-specific security mechanism through the vendor specific compiler.
引用
收藏
页码:181 / +
页数:2
相关论文
共 50 条
  • [1] EORBAC-BASED ACTIVE DIRECTORY MANAGEMENT
    Hassan, Ahmad A.
    Bahgat, Waleed M.
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2009), VOLS 1 AND 2, 2009, : 257 - 264
  • [2] Network Management with mobile agent toolkit
    Bernichi, Maamoun
    Mourlin, Fabrice
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1012 - 1017
  • [3] Security network management system based on Web management technology
    Wang, Haizhou
    Li, Xiao
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [4] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [5] Study of the Security in Network Management Based on Mobile Agents
    CHEN Zhi~1 WANG Ru-chuan~(1
    2.State Key Laboratory for Novel Software Technology
    The Journal of China Universities of Posts and Telecommunications, 2004, (04) : 37 - 42
  • [6] Network security management based on data fusion technology
    Niu Yi
    Zheng Qi-Lun
    Peng Hong
    7TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED INDUSTRIAL DESIGN & CONCEPTUAL DESIGN, 2006, : 889 - 892
  • [7] Fog computing network security based on resources management
    Daoud, Wided Ben
    Othmen, Salwa
    Hamdi, Monia
    Khdhir, Radhia
    Hamam, Habib
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [8] Agent-based intelligent network security management
    Hu Gang-feng
    Li De-yi
    Chen Gui-sheng
    Wu Zuo-shun
    Proceedings of 2006 International Conference on Artificial Intelligence: 50 YEARS' ACHIEVEMENTS, FUTURE DIRECTIONS AND SOCIAL IMPACTS, 2006, : 493 - 496
  • [9] Fog computing network security based on resources management
    Wided Ben Daoud
    Salwa Othmen
    Monia Hamdi
    Radhia Khdhir
    Habib Hamam
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [10] Security extension to grasshopper for network management based policy
    Yang, B
    Liu, DY
    Yang, K
    Yu, WJ
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 10 - 15