Login / Signup

An Automated Validation Method for Security Policies: The Firewall Case.

Ryma AbassiSihem Guemara El Fatmi
Published in: IAS (2008)
Keyphrases
  • significant improvement
  • security policies
  • similarity measure
  • database
  • information systems
  • detection method
  • network security
  • feature selection
  • principal component analysis
  • data processing
  • access control