Sorry, we do not have enough data to show an influence graph for this author.
We present in this paper an approach for modelling the security infrastructure of a network using XML. The modelled system can then be validated on the XML level. From validated models, configurations of concrete nodes, such as firewalls, can be generated automatically. 1. INTRODUCTION Modern networking infrastructures often involve complex interactions… (More)