By Topic

Towards Automation for Pervasive Network Security Management Using an Integration of Ontology-Based and Policy-Based Approaches

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Hui Xu ; Inst. of Comput. Network & Commun., Huazhong Normal Univ., Wuhan ; Xue Xia ; Debao Xiao ; Xuejiao Liu

With the popularity of heterogeneous network devices and security products, pervasive network security management has been a fashion. However, a chief problem lies in how to characterize various attack scenarios from the viewpoint of both security information and security policies for automation. This paper discusses the potential of applying an integration of ontology-based and policy-based approaches to automate pervasive network security management, and then proposes a model in order to validate the feasibility of this integrated approach.

Published in:

Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on

Date of Conference:

18-20 June 2008