JRPIT 41.2.QXP:Layout 1
نویسندگان
چکیده
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application domains. For example, a Network Access Control policy might be configured in terms of firewall, proxy, intrusion prevention and user-access policies. While defined separately, these security policies may interoperate in the sense that the access requirements of one may conflict and/or be redundant with respect to the access requirements of another. Thus, managing a large number of distinct policies becomes a major challenge in terms of deploying and maintaining a meaningful and consistent configuration. It is argued that employing techniques of the Semantic Web—an architecture that supports the formal representation, reasoning and sharing of heterogeneous domain knowledge—provides a natural approach to solving this challenge. A risk-based approach to configuring interoperable Network Access Control policies is described. Each Network Access Control mechanism has an ontology that is used to represent its configuration. This knowledge is unified with higher-level business (risk) rules, providing a single (extensible) ontology that supports reasoning across the different Network Access Control policy configurations.
منابع مشابه
JRPIT 41.1.QXP:Layout 1
This paper examines several key factors affecting the adoption rate of broadband Internet access in 31 provinces of China by employing the Stochastic Frontier Analysis Model. It was found that disposable income, penetration rate of fixed phones, number of Internet users, and educational attainment were the most important factors in the adoption of broadband. In addition, we present the relative...
متن کاملJrpit 38.2.qx
135 Copyright© 2006, Australian Computer Society Inc. General permission to republish, but not for profit, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges were granted by permission of the Australian Computer Society Inc. Face Detection and R...
متن کاملWASM - A Metric for Securing a Web Application
Journal of Research and Practice in Information Technology, Vol. 46, No. 1, February 2014 Copyright© 2014, Australian Computer Society Inc. General permission to republish, but not for profi t, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges ...
متن کاملA Model for Generating Explanatory Web-based Natural-Language Dialogue Interactions for Document Filtering
Journal of Research and Practice in Information Technology, Vol. 34, No. 1, February 2002 2 Copyright© 2001, Australian Computer Society Inc. General permission to republish, but not for profit, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges...
متن کاملProfessional Skills Requirements of IT Professional Practice: Australian IT Graduate Perspectives
Journal of Research and Practice in Information Technology, Vol. 47, No. 1, February 2015 Copyright© 2015, Australian Computer Society Inc. General permission to republish, but not for profi t, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges ...
متن کامل