How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper).
Raman AdaikkalavanSharma ChakravarthyPublished in: DEXA Workshops (2006)
Keyphrases
- invited paper
- access control
- information security
- access control systems
- intrusion detection
- role based access control
- classification rules
- event detection
- security requirements
- security policies
- network security
- role assignment
- security issues
- rule sets
- statistical databases
- neural network
- event sequences
- decision rules
- association rule mining
- event types
- information technology
- web services