Modifying Security Policies for the Satisfaction of Intransitive Non-Interference.
Moez YeddesFeng LinNejib Ben Hadj-AlouanePublished in: IEEE Trans. Autom. Control. (2009)
Keyphrases
- security policies
- access control
- network security
- security management
- distributed systems
- security concerns
- access control systems
- user satisfaction
- security requirements
- access control policies
- information systems
- home network
- unauthorized access
- access control mechanism
- multipath
- database
- cyber attacks
- fine grained