A Top-Down Approach Towards Translating Organizational Security Policy Directives to System Audit Configuration.
Aftab AhmadTobias RuighaverPublished in: SEC (2002)
Keyphrases
- security policies
- access control
- network security
- intrusion detection
- security management
- distributed systems
- security requirements
- network management
- information systems
- information technology
- access control systems
- security concerns
- security architecture
- computer networks
- fine grained
- knowledge management
- ubiquitous computing environments
- access control mechanism
- home network
- business processes
- anomaly detection
- security mechanisms
- data model
- web services
- database