Verifying Security Policies using Host Attributes.
Cornelius DiekmannStephan-Alexander PosseltHeiko NiedermayerHolger KinkelinOliver HankaGeorg CarlePublished in: CoRR (2016)
Keyphrases
- security policies
- access control
- network security
- security management
- security requirements
- distributed systems
- security concerns
- access control systems
- access control policies
- home network
- multilevel secure
- attribute values
- cyber attacks
- model based testing
- access control mechanism
- fine grained
- knowledge management
- real world