From protecting protocols to layers: Designing, implementing and experimenting with security policies in RINA.
Eduard GrasaOndrej RysavýOndrej LichtnerHamid AsgariJohn DayLou ChitkushevPublished in: ICC (2016)
Keyphrases
- security policies
- access control
- unauthorized access
- network security
- security management
- security concerns
- security requirements
- access control systems
- fine grained
- distributed systems
- access control policies
- multilevel secure
- data security
- security mechanisms
- home network
- role based access control
- concurrency control protocols
- machine learning
- data management
- feature selection