Login / Signup
Enforcing Non-safety Security Policies with Program Monitors.
Jay Ligatti
Lujo Bauer
David Walker
Published in:
ESORICS (2005)
Keyphrases
</>
security policies
access control
security management
network security
security concerns
distributed systems
security requirements
access control systems
multilevel secure
home network
fine grained
access control policies
cyber attacks
relational databases
anomaly detection