Download Now Free registration required
Firewall is one of the most widely utilized component on any network architecture, since that a deployment is a very important step to turn the initial policy to a target policy. This operation must be done without presenting any risks or flaws. Much research has already addressed the specification of policies, conflict detection and optimization, but in the authors' paper they will focus on researches that talk about strategies for the security of policy deployment, some researchers have proposed a number of algorithms to solve this problem, they will discuss one of these algorithm then they propose an amelioration of this strategy.
- Format: PDF
- Size: 257.08 KB