Using Equivalence Relations for Corrective Enforcement of Security Policies.
Raphaël KhouryNadia TawbiPublished in: MMM-ACNS (2010)
Keyphrases
- security policies
- equivalence relation
- access control
- xml access control
- access control policies
- mandatory access control
- rough set theory
- rough sets
- security management
- granular computing
- security requirements
- numerical data
- access control systems
- multilevel secure
- network security
- rough set approximations
- distributed systems
- role based access control
- decision rules
- binary relations
- knowledge discovery
- database systems
- concept lattice
- partial order
- anomaly detection
- query language
- pattern recognition
- decision trees