2009 Articles
Configuration Management and Security
Proper configuration management is vital for host and network security. We outline the problems, especially for large-scale environments, and discuss the security aspects of a number of different configuration scenarios, including security appliances (e.g., firewalls), desktop and server computers, and PDAs. We conclude by discussing research challenges.
Subjects
Files
- config-jsac.pdf application/pdf 622 KB Download File
Also Published In
- Title
- IEEE Journal on Selected Areas in Communications
- DOI
- https://doi.org/10.1109/JSAC.2009.090403
More About This Work
- Academic Units
- Computer Science
- Published Here
- April 22, 2010