Verify Consistency between Security Policy and Firewall Policy with Answer Set Programming.
Yiwen LiangWenjun DengPublished in: CSSE (1) (2008)
Keyphrases
- answer set programming
- security policies
- network security
- access control policies
- unauthorized access
- access control
- logic programming
- logic programs
- security architecture
- answer sets
- xml access control
- qualitative spatial and temporal reasoning
- intrusion detection
- security management
- constraint logic programming
- intrusion detection system
- computer networks
- network traffic
- causal theories
- answer set programs
- stable models
- information security
- conflict resolution
- anomaly detection
- distributed systems
- security requirements
- stable model semantics
- path consistency
- disjunctive logic programming
- access control mechanism
- knowledge representation
- information systems
- databases
- modulo theories
- haplotype inference
- general purpose
- data mining