Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies.
Andres MezaRyan KastnerPublished in: CPS-IoT Week Workshops (2023)
Keyphrases
- access control policies
- access control
- security mechanisms
- conflict resolution
- security analysis
- security policies
- access control mechanism
- security requirements
- data security
- access control systems
- sensitive data
- distributed environment
- security issues
- extended logic programs
- identity management
- fine grained
- information security
- resource constrained
- loosely coupled
- data storage
- distributed systems
- data mining
- database