Security-policy monitoring and enforcement with JavaMOP.
Soha HusseinPatrick O'Neil MeredithGrigore RosuPublished in: PLAS (2012)
Keyphrases
- security policies
- access control
- xml access control
- access control policies
- security management
- security requirements
- network security
- fine grained
- security concerns
- security architecture
- access control systems
- home network
- network management
- security mechanisms
- distributed systems
- ubiquitous computing environments
- event logs
- xml databases
- unauthorized access
- databases
- access control mechanism
- distributed environment
- wireless networks
- cloud computing