Towards Automatic Creation of Usable Security Configuration.
Bin ZhangEhab Al-ShaerPublished in: INFOCOM (2010)
Keyphrases
- security issues
- intrusion detection
- information assurance
- information security
- network security
- security problems
- statistical databases
- access control
- high security
- creation process
- optimal configuration
- functional requirements
- security mechanisms
- computer security
- security systems
- security vulnerabilities
- security requirements
- security level
- data sets
- network management
- security policies
- database systems
- databases