Login / Signup
Inconsistency Detecting and Resolving for Security Policy and IPv6 Firewall Policy.
Yi Yin
Yuichiro Tateiwa
Xiaojun Qian
Qian Gao
Lingling Shen
Guoqiang Zhang
Published in:
CSAI (2023)
Keyphrases
</>
security policies
network security
access control policies
network traffic
access control
unauthorized access
intrusion detection
security architecture
xml access control
security management
access control systems
intrusion detection system
security concerns
network management
security requirements
distributed systems
anomaly detection
computer networks
home network
ubiquitous computing environments
role based access control
security measures
access control mechanism
computing systems
event logs
optimal policy
information security