Login / Signup
Should We Prove Security Policies Correct?
Sebastiano Battiato
Giampaolo Bella
Salvatore Riccobene
Published in:
EGCDMAS (2004)
Keyphrases
</>
security policies
access control
distributed systems
security management
security concerns
network security
security requirements
access control systems
home network
unauthorized access
dacs scheme
cyber attacks
access control policies
fine grained
feature selection
machine learning
databases