Sign in

Security Policy Enforcement Through Refinement Process.

Nicolas StoulsMarie-Laure Potet
Published in: B (2007)
Keyphrases
  • policy enforcement
  • refinement process
  • access control
  • security management
  • enterprise network
  • security issues
  • security policies
  • multi tier
  • intrusion detection
  • information security
  • network security
  • attack graph