{"title":"An Adaptive and Optimized Security Policy Manager for Wireless Networks","authors":"D. Nayak","doi":"10.1109/AMS.2007.10","DOIUrl":null,"url":null,"abstract":"The security policy manager resides on each AP. Its sole responsibility is to receive the security policy, transform it into a stack-specific format and then help implement the policy via the underlying protocol stack. Security policy manager receives the policy in a stack-independent XML format. It transforms the policy into a stack-specific format and then determines the changes in the new policy compared to the currently running one. After completing these initial tasks, the Security policy manager helps to carry out these changes in the policy while interacting with the underlying protocol stack, if there will be any conflicts then the security policy manager calls the adaptive security policy optimizer to remove some part of policy and maximizes the output. Changes might require only adding/deleting a new NE to the policy","PeriodicalId":198751,"journal":{"name":"First Asia International Conference on Modelling & Simulation (AMS'07)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First Asia International Conference on Modelling & Simulation (AMS'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AMS.2007.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The security policy manager resides on each AP. Its sole responsibility is to receive the security policy, transform it into a stack-specific format and then help implement the policy via the underlying protocol stack. Security policy manager receives the policy in a stack-independent XML format. It transforms the policy into a stack-specific format and then determines the changes in the new policy compared to the currently running one. After completing these initial tasks, the Security policy manager helps to carry out these changes in the policy while interacting with the underlying protocol stack, if there will be any conflicts then the security policy manager calls the adaptive security policy optimizer to remove some part of policy and maximizes the output. Changes might require only adding/deleting a new NE to the policy