Policy Specification and Enforcement for Detection of Security Violations in a Mail Service.
A. Murali M. RaoPublished in: ICIT (2006)
Keyphrases
- policy enforcement
- access control
- protocol specification
- security policies
- access control policies
- security management
- enterprise network
- xml access control
- web services
- service discovery
- network services
- false positives
- service management
- detection method
- anomaly detection
- security services
- malware detection
- scheduling policies
- object detection
- service providers
- admission control
- application level
- detection algorithm
- network security
- role based access control
- communication protocols
- mobile services
- formal specification
- transport systems
- information security