Information Flow Query and Verification for Security Policy of Security-Enhanced Linux.
Yi-Ming ChenYung-Wei KaoPublished in: IWSEC (2006)
Keyphrases
- information flow
- security policies
- flow graph
- access control
- network security
- information security
- security requirements
- security management
- mandatory access control
- security concerns
- query processing
- flow analysis
- security architecture
- security measures
- distributed systems
- network management
- supply chain
- information flows
- operating system
- access control systems
- communication networks
- database
- social networks
- data sources
- ubiquitous computing environments
- countermeasures
- intrusion detection
- security issues
- random walk
- access control mechanism
- unauthorized access
- security mechanisms
- data mining
- model checking
- shortest path