Security Policy Specification Using a Graphical Approach
James A. HoaglandRaju PandeyKarl N. LevittPublished in: CoRR (1998)
Keyphrases
- security policies
- access control
- network security
- security management
- security concerns
- distributed systems
- security requirements
- network management
- access control systems
- security architecture
- home network
- intrusion detection system
- fine grained
- access control policies
- ubiquitous computing environments
- database management systems
- access control mechanism
- database systems
- database