Browsing by Subject "Perimeter security"
Now showing items 1-2 of 2
-
Conference Object
Using argumentation logic for firewall configuration management
(2009)Firewalls remain the main perimeter security protection for corporate networks. However, network size and complexity make firewall configuration and maintenance notoriously difficult. Tools are needed to analyse firewall ...
-
Article
Using argumentation logic for firewall policy specification and analysis
(2006)Firewalls are important perimeter security mechanisms that imple-ment an organisation's network security requirements and can be notoriously difficult to configure correctly. Given their widespread use, it is crucial that ...