Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules.
Patrick StöckleMichael SammereierBernd GrobauerAlexander PretschnerPublished in: AST (2023)
Keyphrases
- human operators
- security issues
- rule sets
- semi automated
- information security
- statistical databases
- border control
- security vulnerabilities
- production rules
- network security
- intrusion detection
- access control
- association rules
- fully automated
- attribute values
- genetic algorithm
- automatic identification
- data security
- security systems
- database systems
- decision rules
- optimal configuration
- security problems
- user authentication
- automated analysis
- computer security
- distributed systems
- security policies