An adaptive formal parallel technique with reputation integration for the enforcement of security policy in the cloud environment.
Faiza BenmenzerRachid BeghdadPublished in: Comput. Commun. (2022)
Keyphrases
- security policies
- access control
- xml access control
- access control policies
- security management
- network security
- access control systems
- security concerns
- fine grained
- network management
- security requirements
- distributed systems
- ubiquitous computing environments
- security architecture
- security mechanisms
- unauthorized access
- data integration
- event logs
- access control mechanism
- mobile devices
- home network