NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium 2020
DOI: 10.1109/noms47738.2020.9110321
|View full text |Cite
|
Sign up to set email alerts
|

Implementing a Security Policy Management for 5G Customer Edge Nodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…In the interim, correspondence/information specialist co-ops are lawfully needed to accumulate a tremendous amount of client information, bringing about ordinary protection information spills. FL procedures are relied upon to be used to make protection upgraded profound learning in 6G networks to defeat this test 64 .…”
Section: High Security and Privacymentioning
confidence: 99%
“…In the interim, correspondence/information specialist co-ops are lawfully needed to accumulate a tremendous amount of client information, bringing about ordinary protection information spills. FL procedures are relied upon to be used to make protection upgraded profound learning in 6G networks to defeat this test 64 .…”
Section: High Security and Privacymentioning
confidence: 99%
“…We developed SPM to allow the end users and administrators to manage security policies for improving their network communication [23]. SPM consists of a Policy-API, a security policy database and a REST based server.…”
Section: ) Integration With Spmmentioning
confidence: 99%
“…The performance of SPM has been analyzed in [30] and [23]. Our aim is to observe the impact of the integration of SPM on Sec-ALG and RGW's performance.…”
Section: E Policy Databasementioning
confidence: 99%