Which security policies are enforceable by runtime monitors? A survey.
Raphaël KhouryNadia TawbiPublished in: Comput. Sci. Rev. (2012)
Keyphrases
- security policies
- access control
- network security
- security management
- distributed systems
- security requirements
- security concerns
- access control policies
- home network
- access control systems
- unauthorized access
- model based testing
- cyber attacks
- security measures
- fine grained
- security mechanisms
- knowledge discovery
- intrusion detection
- access control mechanism
- unsupervised learning