Managing heterogeneous network environments using an extensible policy framework

Lawrence Teo, Gail Joon Ahn

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

Security policy management is critical to meet organizational needs and reduce potential risks because almost every organization depends on computer networks and the Internet for their daily operations. It is therefore important to specify and enforce security policies effectively. However, as organizations grow, so do their networks increasing the difficulty of deploying a security policy, especially across heterogeneous systems. In this paper, we introduce a policy framework called Chameleos-x which is designed to enforce security policies consistently across security-aware systems with network services-primarily operating systems, firewalls, and intrusion detection systems. Throughout this paper, we focus on the design and architecture of Chameleos-x and demonstrate how our policy framework helps organizations implement security policies in changing, diversity-rich environments. We also describe our experimentation of Chameleos-x to demonstrate the feasibility of the proposed approach.

Original languageEnglish (US)
Title of host publicationProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
Pages362-364
Number of pages3
DOIs
StatePublished - 2007
Externally publishedYes
Event2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 - Singapore, Singapore
Duration: Mar 20 2007Mar 22 2007

Publication series

NameProceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07

Other

Other2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
Country/TerritorySingapore
CitySingapore
Period3/20/073/22/07

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'Managing heterogeneous network environments using an extensible policy framework'. Together they form a unique fingerprint.

Cite this