An Access Check System on Account of Firewall's Rule Conflicts Detection

Article Preview

Abstract:

Cater to the needs of company, we have developed an access check system based on multilevel firewalls which can effectively control the clients' access to the server. Its work flow consists of four steps, namely centralized administration, filling in applications, examining applications and automatically altering firewalls. This system can promote the company's efficiency to the maximum by using minimum human resources.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2677-2680

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Barkley J F. Comparing simple role based access control models and access control lists. [EB/OL]. (1997).

DOI: 10.1145/266741.266769

Google Scholar

[2] David Ferraiolo and Richard Kuhn. Role-based access controls. In 15th NIST-NCSC National Computer Security Conference, pages 554-563, Baltimore, MD, October 13-16 1992.

Google Scholar

[3] S. H. von Solms and Isak van der Merwe. The management of computer security profiles using a role-oriented approach. Computer & Security, 13(8): 673-680, (1994).

DOI: 10.1016/0167-4048(94)90049-3

Google Scholar

[4] Ravi S. Sandhu. The Typed Access Matrix Model. In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 122-136, Oakland, CA, May (1992).

DOI: 10.1109/risp.1992.213266

Google Scholar

[5] Barkely J F, Cincotta A V. Role based access control for the world wide web[EB/OL]. (1998).

Google Scholar

[6] Al-Shaer E, Hamed H. Firewall Policy Advisor for Anomaly Detection and Rule Editing[C]/Proceedings of IEEE/IFIP IM'03. Colorado Springs, USA: [s. n. ], (2003).

DOI: 10.1109/inm.2003.1194157

Google Scholar

[7] Al-Shaer E, Hamed H. Design and implementation of firewall policy advisor tools[R].

Google Scholar

[8] Wool A. A Quantitative Study of Firewall Configuration Errors, [J]. IEEE Computer, 2004, 37(6): 62-67.

DOI: 10.1109/mc.2004.2

Google Scholar

[9] GOUDA M, LIU X. Firewall Design: Consistency, Completeness, and Compactness[A]. (ICDCS 04) [C], March (2004).

Google Scholar

[10] CiscoWorks2000 access control list manager 1. 2 overview. November (2000).

Google Scholar

[11] Taylor D E, Turner J S. ClassBench: A packet classification benchmark. [R]. Saint Louis, USA: Washington University in Saint Louis, Tech. Rep.: WUCSE-2004-28, (2004).

Google Scholar

[12] Gupta P, McKeown N. Algorithms for Packet Classification: [J]. IEEE Network, 2001, 15(2): 24-32.

Google Scholar

[13] BABOESCU F, VARGHESE G. Fast and Scalable Conflict Detection for Packet Classifiers. [A]. Proceedings of the 10th IEEE International Conference on Network Protocols[C], (2002).

DOI: 10.1109/icnp.2002.1181414

Google Scholar

[14] HAN J, KAMBER M. Data Mining: concepts and techniques. [M]. Morgan Kaufmann, (2000).

Google Scholar