Formal Analysis of Security Policy Implementations in Enterprise Networks

Download Now
Provided by: Academy & Industry Research Collaboration Center
Topic: Security
Format: PDF
The management of security, operations and services in large scale enterprise networks is becoming more difficult due to complex security policies of the organizations and also due to dynamic changes in network topologies. Typically, the global security policy of an enterprise network is implemented in a distributed fashion through appropriate sets of Access ControL rules (ACL rules) across various interface switches (layer 3 switches) in the network. In such networks, verification of the ACL implementations with respect to the security policies is a major technical challenge to the network administrators.
Download Now

Find By Topic