Distributed Security Policy Conformance.
Mirko MontanariEllick ChanKevin LarsonWucherl YooRoy H. CampbellPublished in: SEC (2011)
Keyphrases
- security policies
- distributed systems
- access control
- network management
- network security
- security management
- security concerns
- distributed environment
- security requirements
- access control systems
- mobile agents
- computer networks
- peer to peer
- event logs
- access control policies
- home network
- databases
- unauthorized access
- ubiquitous computing environments
- distributed data
- agent technology
- data processing
- real world