Login / Signup
A validated security policy modeling approach.
James W. Freeman
Richard B. Neely
M. A. Heckard
Published in:
ACSAC (1994)
Keyphrases
</>
security policies
access control
network security
security management
security requirements
distributed systems
data analysis
semi supervised
petri net
security concerns
access control policies
access control systems