Distributed security policy conformance.
Mirko MontanariEllick ChanKevin LarsonWucherl YooRoy H. CampbellPublished in: Comput. Secur. (2013)
Keyphrases
- security policies
- distributed systems
- access control
- security management
- security concerns
- network management
- distributed environment
- network security
- security requirements
- access control systems
- loosely coupled
- multi tier
- computer networks
- distributed data
- security architecture
- database systems
- unauthorized access
- access control mechanism
- computing environments
- semi supervised