Enforcing IRM security policies: Two case studies.
Micah JonesKevin W. HamlenPublished in: ISI (2009)
Keyphrases
- security policies
- case study
- access control
- security management
- network security
- security concerns
- security requirements
- access control systems
- distributed systems
- lessons learned
- access control policies
- software development
- unauthorized access
- databases
- multilevel secure
- home network
- database systems
- database
- model based testing