Automated Distribution of Access Control Rules in Defense Layers of an Enterprise Network.
Adam PavlidisMarinos DimolianisDimitris KalogerasVasilis MaglarisPublished in: IM (2019)
Keyphrases
- access control
- policy enforcement
- enterprise network
- security issues
- fine grained
- dynamic access control
- security mechanisms
- data security
- access control models
- security policies
- access control systems
- role based access control
- access control policies
- attack graph
- security requirements
- intrusion detection
- association rules
- database security
- data mining
- rbac model
- response time
- information systems