Trust-Adapted Enforcement of Security Policies in Distributed Component-Structured Applications.
Peter HerrmannHeiko KrummPublished in: ISCC (2001)
Keyphrases
- network traffic
- security policies
- network security
- computer networks
- access control
- policy enforcement
- security management
- distributed systems
- mandatory access control
- access control policies
- xml access control
- security concerns
- distributed environment
- data security
- access control systems
- security requirements
- access control models
- open systems
- multilevel secure
- fine grained
- peer to peer
- loosely coupled
- access rights
- multi tier
- security mechanisms
- trusted computing
- database
- software architecture
- database systems
- real world