Modelling and Analysing Network Security Policies in a Given Vulnerability Setting.
Roland RiekePublished in: CRITIS (2006)
Keyphrases
- security policies
- network management
- access control
- security requirements
- home network
- cyber attacks
- computer networks
- dacs scheme
- access control systems
- security concerns
- security management
- wireless sensor networks
- network security
- security measures
- buffer overflow
- network traffic
- data processing
- distributed systems
- network configuration
- database systems
- databases