A Novelty Approach for Checking Consistency of Security Policy.
Changhua LiuYaqin LiZhensong LiaoPublished in: IFITA (3) (2009)
Keyphrases
- security policies
- consistency checking
- access control
- security management
- network management
- network security
- distributed systems
- security concerns
- security architecture
- access control policies
- security requirements
- ubiquitous computing environments
- home network
- unauthorized access
- fine grained
- access control systems
- computer networks
- access control mechanism
- intrusion detection
- distributed environment