Review of Security Policy Implementations

Macfarlane, R., Buchanan, W., Ekonomou, E., Uthmani, O., Fan, L., Lo, O. (2012). Review of Security Policy Implementations. Computers & Security, 31, (2), 253-271.

ISSN: 0167-4048


Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper provides an overview of the different type of policies relating to security in networks, and a taxonomy of the research into systems which have been proposed to support the network administrators in difficult tasks of creating, managing and deploying these policies.
[Read More]


William Buchanan
Director of CDCS
+44 131 455 2759
Lu Fan
Senior Research Fellow
+44 131 455 2438
Richard Macfarlane
+44 131 455 2335
Elias Ekonomou
+44 131 455 2789
Owen Lo
Research Fellow
+44 131 455
Omair Uthmani
+44 131 455

Areas of Expertise

Electronic information now plays a vital role in almost every aspect of our daily lives. So the need for a secure and trustworthy online infrastructure is more important than ever. without it, not only the growth of the internet but our personal interactions and the economy itself could be at risk.

Associated Projects