2006
DOI: 10.1109/mcom.2006.1607877
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy of conflicts in network security policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
104
0
3

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 146 publications
(108 citation statements)
references
References 8 publications
1
104
0
3
Order By: Relevance
“…It may consequent in the electronic operating environment the appearance of several problems, including the problem of the disappearance of the set of books and documents where it became having a new model thus several stages were incorporated to be shown as one stage in the electronic operating also the impact of data electronic operating extended to the place of operation (Hamed, H., & Al-Shaer, E. 2006) where these operations became fully carried out within the accountant itself and it shall consequent thereof the proof guide become invisible in its nature in contrary to what the auditor accustomed under the manual systems (Romney et al, 2013). The proof of evidence in light of data electronic operating in programs, records, operating systems, followed configuration system and engineering design of PCs, software and the proof of evidence shall lose its strength if it exposed to any of the errors that can occur in the value of the primary elements when introduced into the computer, when updated, when stored or when you make some modifications therein (Arens et al, 2012).…”
Section: The Problem Of the Studymentioning
confidence: 99%
“…It may consequent in the electronic operating environment the appearance of several problems, including the problem of the disappearance of the set of books and documents where it became having a new model thus several stages were incorporated to be shown as one stage in the electronic operating also the impact of data electronic operating extended to the place of operation (Hamed, H., & Al-Shaer, E. 2006) where these operations became fully carried out within the accountant itself and it shall consequent thereof the proof guide become invisible in its nature in contrary to what the auditor accustomed under the manual systems (Romney et al, 2013). The proof of evidence in light of data electronic operating in programs, records, operating systems, followed configuration system and engineering design of PCs, software and the proof of evidence shall lose its strength if it exposed to any of the errors that can occur in the value of the primary elements when introduced into the computer, when updated, when stored or when you make some modifications therein (Arens et al, 2012).…”
Section: The Problem Of the Studymentioning
confidence: 99%
“…In fact, the problem can arise for many dierent policy applications where some implicit coordination of behaviour is required. This example specically looks at the case for rewall policies, but the problem may also arise for routing policies and network security IPsec policies (Hamed and Al-Shaer, 2006). A exible and extensible method of incorporating semantic information into the information model is required so that such cases as described here do not cause a problem for policy conict analysis.…”
Section: Motivating Examplementioning
confidence: 99%
“…One of the most important advances has been made by Al-Saher et al [4,12]. In their works, authors define an inconsistency model for firewall rule sets, and they provide an order-dependent characterization of different kinds of inconsistencies by pairs of rules.…”
Section: Related Workmentioning
confidence: 99%
“…A complete characterization has been given by Al-Shaer et al [12] that include shadowing, generalization, correlation and redundancy (all of them except correlation are order-dependent).…”
Section: Analysis Of the Consistency Problemmentioning
confidence: 99%
See 1 more Smart Citation