Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy.
Yi YinYuichiro TateiwaXiaojun QianQian GaoLingling ShenGuoqiang ZhangPublished in: CSAI (2023)
Keyphrases
- security policies
- network security
- access control policies
- network traffic
- access control
- unauthorized access
- intrusion detection
- security architecture
- xml access control
- security management
- access control systems
- intrusion detection system
- security concerns
- network management
- security requirements
- distributed systems
- anomaly detection
- computer networks
- home network
- ubiquitous computing environments
- role based access control
- security measures
- access control mechanism
- computing systems
- event logs
- optimal policy
- information security