Composing expressive runtime security policies.
Lujo BauerJay LigattiDavid WalkerPublished in: ACM Trans. Softw. Eng. Methodol. (2009)
Keyphrases
- security policies
- access control
- security management
- network security
- security concerns
- distributed systems
- security requirements
- access control systems
- access control policies
- multilevel secure
- unauthorized access
- computer networks
- dacs scheme
- databases
- home network
- access control mechanism
- supervised learning
- data warehouse
- relational databases
- database systems
- data mining