Review of Security Policy Implementations

Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31, (2), 253-271.


ISBN:
ISSN: 0167-4048

Abstract

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper provides an overview of the different type of policies relating to security in networks, and a taxonomy of the research into systems which have been proposed to support the network administrators in difficult tasks of creating, managing and deploying these policies.
[Read More]

Authors

William Buchanan
Director of CDCS
w.buchanan@napier.ac.uk
+44 131 455 2759
Lu Fan
Senior Research Fellow
l.fan@napier.ac.uk
+44 131 455 2438
Richard Macfarlane
Lecturer
r.macfarlane@napier.ac.uk
+44 131 455 2335
Elias Ekonomou
Lecturer
E.Ekonomou@napier.ac.uk
+44 131 455 2789
Owen Lo
Research Fellow
o.lo@napier.ac.uk
+44 131 455
Omair Uthmani
Academic
o.uthmani@napier.ac.uk
+44 131 455

Areas of Expertise

Cyber-Security
Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.

Associated Projects