Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.
Jong-Young KohMi Ra YiTae Ho ChoHyung-Jong KimHong-Geun KimPublished in: ICICS (2002)
Keyphrases
- security policies
- network management
- access control
- network security
- security measures
- network simulator
- network structure
- network traffic
- security concerns
- computer networks
- cyber attacks
- security requirements
- home network
- distributed systems
- network access
- peer to peer
- access control systems
- security management
- dacs scheme
- database
- communication networks
- data processing
- knowledge discovery
- wireless sensor networks
- database systems