Automatic Security Policy Management in Modern Networks View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2004

AUTHORS

S. Raj Rajagopalan

ABSTRACT

Problems in network security management have outgrown the capabilities of current human-intensive administrative methodologies. There is a significant need for automation of network security operations that is not being addressed. This article proposes a new way of looking at the security automation problem and lays down some requirements for developing appropriate technologies to minimize human involvement. We also describe a new technology built on this design called “Smart Firewalls.” More... »

PAGES

173-187

Book

TITLE

Guarding Your Business

ISBN

0-306-48494-3

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/0-306-48638-5_10

DOI

http://dx.doi.org/10.1007/0-306-48638-5_10

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1049538303


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Ericsson (United States)", 
          "id": "https://www.grid.ac/institutes/grid.432790.b", 
          "name": [
            "Telcordia Technologies, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Rajagopalan", 
        "givenName": "S. Raj", 
        "id": "sg:person.012053403361.56", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012053403361.56"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2004", 
    "datePublishedReg": "2004-01-01", 
    "description": "Problems in network security management have outgrown the capabilities of current human-intensive administrative methodologies. There is a significant need for automation of network security operations that is not being addressed. This article proposes a new way of looking at the security automation problem and lays down some requirements for developing appropriate technologies to minimize human involvement. We also describe a new technology built on this design called \u201cSmart Firewalls.\u201d", 
    "editor": [
      {
        "familyName": "Ghosh", 
        "givenName": "Sumit", 
        "type": "Person"
      }, 
      {
        "familyName": "Malek", 
        "givenName": "Manu", 
        "type": "Person"
      }, 
      {
        "familyName": "Stohr", 
        "givenName": "Edward A.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/0-306-48638-5_10", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "0-306-48494-3"
      ], 
      "name": "Guarding Your Business", 
      "type": "Book"
    }, 
    "name": "Automatic Security Policy Management in Modern Networks", 
    "pagination": "173-187", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/0-306-48638-5_10"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "ebfd1687f5938ce27a8ad5dd6fc789c29a965d2e8c13ce6309907ee53cbdd083"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1049538303"
        ]
      }
    ], 
    "publisher": {
      "location": "Boston", 
      "name": "Kluwer Academic Publishers", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/0-306-48638-5_10", 
      "https://app.dimensions.ai/details/publication/pub.1049538303"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T18:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8684_00000085.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/0-306-48638-5_10"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/0-306-48638-5_10'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/0-306-48638-5_10'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/0-306-48638-5_10'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/0-306-48638-5_10'


 

This table displays all metadata directly associated to this object as RDF triples.

74 TRIPLES      22 PREDICATES      27 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/0-306-48638-5_10 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N67620bfa21e942eb8bb7a5ec6d636c0e
4 schema:datePublished 2004
5 schema:datePublishedReg 2004-01-01
6 schema:description Problems in network security management have outgrown the capabilities of current human-intensive administrative methodologies. There is a significant need for automation of network security operations that is not being addressed. This article proposes a new way of looking at the security automation problem and lays down some requirements for developing appropriate technologies to minimize human involvement. We also describe a new technology built on this design called “Smart Firewalls.”
7 schema:editor N610f4b5bcb81437bb8ba635795bcb2ac
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Na34c37d9516140dc8f3beb227973e197
12 schema:name Automatic Security Policy Management in Modern Networks
13 schema:pagination 173-187
14 schema:productId N3418e0ce1cf64c3a9cca1e88fcfce724
15 N3a06e45dcae040f998831e1a2985d7f7
16 N4ba419885a20489c8bb88bef8b599c82
17 schema:publisher Nbeb5b6f894974177b6b3c09c148b9c06
18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049538303
19 https://doi.org/10.1007/0-306-48638-5_10
20 schema:sdDatePublished 2019-04-15T18:59
21 schema:sdLicense https://scigraph.springernature.com/explorer/license/
22 schema:sdPublisher Ne8cee41d25cf4c68a36c1ff1c494cecf
23 schema:url http://link.springer.com/10.1007/0-306-48638-5_10
24 sgo:license sg:explorer/license/
25 sgo:sdDataset chapters
26 rdf:type schema:Chapter
27 N277e8948e35f468c80632d91a7accd88 schema:familyName Stohr
28 schema:givenName Edward A.
29 rdf:type schema:Person
30 N3418e0ce1cf64c3a9cca1e88fcfce724 schema:name dimensions_id
31 schema:value pub.1049538303
32 rdf:type schema:PropertyValue
33 N3a06e45dcae040f998831e1a2985d7f7 schema:name readcube_id
34 schema:value ebfd1687f5938ce27a8ad5dd6fc789c29a965d2e8c13ce6309907ee53cbdd083
35 rdf:type schema:PropertyValue
36 N4223b7efa89543beb3b3fcc35ebd8e04 rdf:first N277e8948e35f468c80632d91a7accd88
37 rdf:rest rdf:nil
38 N4ba419885a20489c8bb88bef8b599c82 schema:name doi
39 schema:value 10.1007/0-306-48638-5_10
40 rdf:type schema:PropertyValue
41 N610f4b5bcb81437bb8ba635795bcb2ac rdf:first Nd0f24b9c9433403fbc7ee3461f653455
42 rdf:rest Ne691e4d1a64c4ecf97558ece006a9d66
43 N67620bfa21e942eb8bb7a5ec6d636c0e rdf:first sg:person.012053403361.56
44 rdf:rest rdf:nil
45 Na34c37d9516140dc8f3beb227973e197 schema:isbn 0-306-48494-3
46 schema:name Guarding Your Business
47 rdf:type schema:Book
48 Nbeb5b6f894974177b6b3c09c148b9c06 schema:location Boston
49 schema:name Kluwer Academic Publishers
50 rdf:type schema:Organisation
51 Nd0f24b9c9433403fbc7ee3461f653455 schema:familyName Ghosh
52 schema:givenName Sumit
53 rdf:type schema:Person
54 Nd288a02e59514dfbad9ed48ac4b50e16 schema:familyName Malek
55 schema:givenName Manu
56 rdf:type schema:Person
57 Ne691e4d1a64c4ecf97558ece006a9d66 rdf:first Nd288a02e59514dfbad9ed48ac4b50e16
58 rdf:rest N4223b7efa89543beb3b3fcc35ebd8e04
59 Ne8cee41d25cf4c68a36c1ff1c494cecf schema:name Springer Nature - SN SciGraph project
60 rdf:type schema:Organization
61 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
62 schema:name Technology
63 rdf:type schema:DefinedTerm
64 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
65 schema:name Communications Technologies
66 rdf:type schema:DefinedTerm
67 sg:person.012053403361.56 schema:affiliation https://www.grid.ac/institutes/grid.432790.b
68 schema:familyName Rajagopalan
69 schema:givenName S. Raj
70 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012053403361.56
71 rdf:type schema:Person
72 https://www.grid.ac/institutes/grid.432790.b schema:alternateName Ericsson (United States)
73 schema:name Telcordia Technologies, USA
74 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...