Micro-Policies: Formally Verified, Tag-Based Security Monitors.
Arthur Azevedo de AmorimMaxime DénèsNick GiannarakisCatalin HritcuBenjamin C. PierceAntal Spector-ZabuskyAndrew TolmachPublished in: IEEE Symposium on Security and Privacy (2015)
Keyphrases
- information security
- network security
- security management
- security problems
- security requirements
- role based access control
- security measures
- access control
- intrusion detection
- optimal policy
- security mechanisms
- computer security
- social web
- information assurance
- security level
- statistical databases
- information systems
- security systems
- security protocols
- data mining
- security policies
- database systems
- management policies
- security vulnerabilities