{"title":"无线网络自适应优化安全策略管理器","authors":"D. Nayak","doi":"10.1109/AMS.2007.10","DOIUrl":null,"url":null,"abstract":"The security policy manager resides on each AP. Its sole responsibility is to receive the security policy, transform it into a stack-specific format and then help implement the policy via the underlying protocol stack. Security policy manager receives the policy in a stack-independent XML format. It transforms the policy into a stack-specific format and then determines the changes in the new policy compared to the currently running one. After completing these initial tasks, the Security policy manager helps to carry out these changes in the policy while interacting with the underlying protocol stack, if there will be any conflicts then the security policy manager calls the adaptive security policy optimizer to remove some part of policy and maximizes the output. Changes might require only adding/deleting a new NE to the policy","PeriodicalId":198751,"journal":{"name":"First Asia International Conference on Modelling & Simulation (AMS'07)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"An Adaptive and Optimized Security Policy Manager for Wireless Networks\",\"authors\":\"D. Nayak\",\"doi\":\"10.1109/AMS.2007.10\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security policy manager resides on each AP. Its sole responsibility is to receive the security policy, transform it into a stack-specific format and then help implement the policy via the underlying protocol stack. Security policy manager receives the policy in a stack-independent XML format. It transforms the policy into a stack-specific format and then determines the changes in the new policy compared to the currently running one. After completing these initial tasks, the Security policy manager helps to carry out these changes in the policy while interacting with the underlying protocol stack, if there will be any conflicts then the security policy manager calls the adaptive security policy optimizer to remove some part of policy and maximizes the output. Changes might require only adding/deleting a new NE to the policy\",\"PeriodicalId\":198751,\"journal\":{\"name\":\"First Asia International Conference on Modelling & Simulation (AMS'07)\",\"volume\":\"46 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"First Asia International Conference on Modelling & Simulation (AMS'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AMS.2007.10\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"First Asia International Conference on Modelling & Simulation (AMS'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AMS.2007.10","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Adaptive and Optimized Security Policy Manager for Wireless Networks
The security policy manager resides on each AP. Its sole responsibility is to receive the security policy, transform it into a stack-specific format and then help implement the policy via the underlying protocol stack. Security policy manager receives the policy in a stack-independent XML format. It transforms the policy into a stack-specific format and then determines the changes in the new policy compared to the currently running one. After completing these initial tasks, the Security policy manager helps to carry out these changes in the policy while interacting with the underlying protocol stack, if there will be any conflicts then the security policy manager calls the adaptive security policy optimizer to remove some part of policy and maximizes the output. Changes might require only adding/deleting a new NE to the policy