Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99)
DOI: 10.1109/csac.1999.816030
|View full text |Cite
|
Sign up to set email alerts
|

Policy-based management: bridging the gap

Abstract: In a policy-based system, policy goals are described with respect to network entities (e.g., networks and users) instead of enforcement points (e.g., firewalls and routers). This global view has several advantages: usability, global rules are closer to the goals of the human administrator; scalability, the policy system ensures that the enforcement points are configured appropriately, whether there are 1 or 100 enforcement points; and security, the policy system ensures that the policy is enforced consistent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…In [6], the authors adopted a better approach by using a modular architecture that separates the security policy and the underlying network topology to allow for flexible modification of the network topology without the need to update the security policy. Similar work has been done in [14] with a procedural policy definition language, and in [16] with an object-oriented policy definition language. In terms of distributed firewall policy enforcement, a novel architecture is proposed in [15] where the authors suggest using a trust management system to enforce a centralized security policy at individual network endpoints based on access rights granted to users or hosts.…”
Section: Related Workmentioning
confidence: 93%
“…In [6], the authors adopted a better approach by using a modular architecture that separates the security policy and the underlying network topology to allow for flexible modification of the network topology without the need to update the security policy. Similar work has been done in [14] with a procedural policy definition language, and in [16] with an object-oriented policy definition language. In terms of distributed firewall policy enforcement, a novel architecture is proposed in [15] where the authors suggest using a trust management system to enforce a centralized security policy at individual network endpoints based on access rights granted to users or hosts.…”
Section: Related Workmentioning
confidence: 93%
“…On the other hand, few related work [6,10] present a resolution for the correlation conflict problem only. Other approaches [2,9,12,14,18] propose using a high-level policy language to define and analyze firewall policies and then map this language to filtering rules. Firewall query-based languages based on filtering rules are also proposed in [7,11].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the entire relevant policy rule-set must be available at an enforcement point; this may cause scalability problems with respect to the number of users, peer nodes, and policy entries. Other similar work includes [Hinrichs 1999;Guttman 1997;Molitor 1995;Damianou 2002] (although the latter, Ponder, does allow delegation).…”
Section: Domain Specific Languagesmentioning
confidence: 99%