A formal approach for network security policy validation.
Fulvio ValenzaTao SuSerena SpinosoAntonio LioyRiccardo SistoMarco ValliniPublished in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2017)
Keyphrases
- security policies
- network management
- access control
- network security
- security requirements
- security management
- security architecture
- computer networks
- network access
- home network
- network structure
- network traffic
- security concerns
- ubiquitous computing environments
- model based testing
- peer to peer
- access control policies
- cloud computing
- security measures
- distributed systems
- wireless sensor networks
- data model