Specifying and Implementing Security Policies Using LaSCO, the Language for Security Constraints on Objects
James A. HoaglandPublished in: CoRR (2000)
Keyphrases
- security policies
- access control
- security management
- network security
- security requirements
- security concerns
- distributed systems
- access control systems
- fine grained access control
- network management
- cyber attacks
- database applications
- security measures
- access control policies
- multilevel secure
- computer networks
- security mechanisms
- data security
- distributed databases
- anomaly detection
- peer to peer