Security Policy Consistency
Carlos RibeiroAndre ZuquetePaulo FerreiraPaulo GuedesPublished in: CoRR (2000)
Keyphrases
- security policies
- access control
- network security
- security management
- security concerns
- network management
- distributed systems
- security requirements
- security architecture
- home network
- ubiquitous computing environments
- access control systems
- real world
- event logs
- computer networks
- computer systems
- query processing
- information systems
- database
- unauthorized access