Back to Results
First PageMeta Content
Security / Crime prevention / Data security / Information security / National security / Network security / Routing / Cisco IOS / Data mining / Computing / Network architecture / Computer security


Using Hierarchal Change Mining to Manage Network Security Policy Evolution Gabriel A. Weaver, Nick Foti, Sergey Bratus, Dan Rockmore, Sean W. Smith Deparment of Computer Science Dartmouth College, Hanover, New Hampshire
Add to Reading List

Document Date: 2011-04-01 14:57:36


Open Document

File Size: 359,43 KB

Share Result on Facebook

City

Innovative Policy / RANCID / /

Company

Adobe / Combine Separate Systems / Facebook / Cisco / Networked Systems / Microsoft / /

Facility

Dartmouth College / Computer Science Dartmouth College / Perseus Digital Library / /

IndustryTerm

change detection software / software engineering / identity management / large real-world systems / network service management / data mining / data-mining / hierarchical change mining / open-source systems / Internet Network Management / distributed computing system / software-engineering / Internet X. / hierarchical change mining leverage / college telephony / phone service when that router / Internet services fail / Internet Technologies / network management / Voice Over IP / /

OperatingSystem

Linux / Cisco IOS / /

Organization

International Grid Trust Federation / European Union Grid Policy Management Authority / IGTF PKI / U.S. Securities and Exchange Commission / Dartmouth College / Electronic Society / USENIX Association / Americas Grid Policy Managment Policy Authority / Large Installation System Administration / Dartmouth Computing Service / Asia-Pacific Policy Management Authority / Trust on the Internet / Department of Defense / /

Person

Sergey Bratus / Dan Rockmore / Sean W. Smith / Nick Foti / E-type / Gregory Crane / Gabriel A. Weaver / /

/

Position

hierarchical model of policy / industrial security consultant / /

ProgrammingLanguage

XML / /

PublishedMedium

The Definitive Guide / /

Technology

XML / Public Key Infrastructure / VOIP routers / Linux / Information Technology / PKI / MAC address / html / ISDN / Public Key / data mining / DOM / VOIP / flash / /

URL

http /

SocialTag