Implementing Security Policies using the Safe Areas of Computation Approach.
André L. M. dos SantosRichard A. KemmererPublished in: ACSAC (2000)
Keyphrases
- security policies
- access control
- security management
- network security
- access control systems
- security requirements
- distributed systems
- access control policies
- security concerns
- dacs scheme
- access control mechanism
- multilevel secure
- cyber attacks
- fine grained
- object oriented
- anomaly detection
- unauthorized access
- model based testing
- information systems