Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures.
Matthew HaganFahad SiddiquiSakir SezerPublished in: SoCC (2018)
Keyphrases
- policy enforcement
- access control
- access control policies
- security management
- security policies
- enterprise network
- xml access control
- security requirements
- security mechanisms
- role based access control
- data security
- intrusion detection
- digital rights
- security issues
- privacy policies
- computer security
- intellectual property protection
- functional requirements
- embedded systems
- information security
- data mining
- real time embedded
- security threats
- digital rights management
- web services
- digital images
- distributed systems
- optimal policy
- trust negotiation
- statistical databases
- security systems
- key management
- security protocols
- security analysis