Toward Provenance-Based Security for Configuration Languages.
Paul AndersonJames CheneyPublished in: TaPP (2012)
Keyphrases
- network security
- intrusion detection
- security issues
- information assurance
- metadata
- access control
- information security
- security requirements
- databases
- statistical databases
- language identification
- security threats
- language independent
- security policies
- expressive power
- security management
- relational databases
- optimal configuration
- security mechanisms
- security problems
- grammatical inference
- security systems
- security measures
- functional requirements
- security level
- security protocols
- key management
- cross lingual
- computer networks
- fine grained
- object oriented