A novel logic-based automatic approach to constructing compliant security policies.
Yibao BaoLihua YinBinxing FangLi GuoPublished in: Sci. China Inf. Sci. (2012)
Keyphrases
- security policies
- access control
- distributed systems
- network security
- security management
- access control systems
- security requirements
- security concerns
- real world
- database management systems
- knowledge representation
- access control policies
- multi tier
- object recognition
- access control mechanism
- machine learning
- home network
- databases
- dacs scheme