Enhancing Security Using Legality Assertions.
Lei WangJames R. CordyThomas R. DeanPublished in: WCRE (2005)
Keyphrases
- access control
- security policies
- intrusion detection
- information security
- security issues
- statistical databases
- security requirements
- security problems
- information systems
- security properties
- network security
- information assurance
- security analysis
- security mechanisms
- knowledge base
- operating system
- security protocols
- security model
- security systems
- databases
- security management
- data sets