Learn More
The scheduling scheme of a switch affects the delay, throughput and fairness of a network and thus has a great impact on the quality of service (QoS). In Part I, we present a theoretical analysis of a burst scheduling for ATM switches and proved QoS guarantees on throughput and fairness of the applications. Here, we use simulation to demonstrate the(More)
—More and more Internet services and applications are transferred by the HTTP protocol due to its openness. This brings new challenges to the security management of network boundary. In this paper, a new approach is proposed to detect the pseudo Web behavior which abuses the general HTTP protocol to pass through the network boundary. A new parameter is(More)
Using high-level security policy rules to regulate low-level system, the security management system with a high level of expansibility and flexibility was made. For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, a dynamic and self-adaptive security policy realization(More)
Security policy is the core of information system security management. In order to solve the problem of the security policy unified specification description, the classification and normative description are proposed based on the relationship between its object classes, which reflect the network information system and engineering security products and(More)
For purpose of managing network security policy duly and flexibly in the complex network environment, and resolving its issue efficiency, this paper proposes network security policy self-adaptive management and distribution model. An incident triggered, policy-driven and self-adaptive management mechanism is established, and the impact of safety equipment(More)
The validity of the network security policy has important impacts on the safety performance of network information system. For purpose of verifying the network security policy repository effectively, a verification model of security policy repository based on EHLPN is proposed. The HLPN is expanded, and based on the establishing of EHLPN model directed(More)