Verification of Cloud Security Policies.
Loïc MillerPascal MérindolAntoine GallaisCristel PelsserPublished in: HPSR (2021)
Keyphrases
- security policies
- access control
- security management
- security concerns
- network security
- distributed systems
- security requirements
- cloud computing
- access control policies
- access control systems
- network access
- home network
- cyber attacks
- fine grained
- model checking
- operating system
- database
- virtual machine
- multilevel secure
- data mining
- unauthorized access