Management of security policy configuration using a Semantic Threat Graph approach.
Simon N. FoleyWilliam M. FitzgeraldPublished in: J. Comput. Secur. (2011)
Keyphrases
- security policies
- network management
- security management
- access control
- network security
- distributed systems
- management system
- security requirements
- access control systems
- access control policies
- structured data
- data processing
- home network
- countermeasures
- knowledge management
- information systems
- security architecture
- security concerns
- smart card
- data management
- ubiquitous computing environments
- security measures
- data mining