Anomaly analysis for Physical Access Control security configuration.
William M. FitzgeraldFatih TurkmenSimon N. FoleyBarry O'SullivanPublished in: CRiSIS (2012)
Keyphrases
- access control
- data security
- security policies
- fine grained
- security mechanisms
- dynamic access control
- security requirements
- policy enforcement
- role based access control
- security enforcement
- security model
- database security
- intrusion detection
- access control policies
- access control mechanism
- access control models
- domain specific
- identity management
- anomaly detection
- data protection
- security architecture
- unauthorized access
- distributed systems