Taking into Account Functional Models in the Validation of IS Security Policies.
Yves LedruAkram IdaniJérémy MilhauNafees QamarRégine LaleauJean-Luc RichierMohamed-Amine LabiadhPublished in: CAiSE Workshops (2011)
Keyphrases
- security policies
- access control
- model based testing
- network security
- security management
- distributed systems
- security requirements
- security concerns
- access control systems
- access control policies
- multilevel secure
- cyber attacks
- intrusion detection
- fine grained
- operating system
- relational databases
- access control mechanism
- unauthorized access
- data model