Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach.
Maryem Ait El HadjMohammed ErradiAhmed KhoumsiYahya BenkaouzPublished in: IEEE BigData (2018)
Keyphrases
- security policies
- access control
- access control systems
- clustering algorithm
- unauthorized access
- access control mechanism
- k means
- fine grained
- model based testing
- security concerns
- clustering method
- network security
- security requirements
- access control policies
- security management
- unsupervised learning
- role based access control
- home network
- data security
- network access
- access requests
- cluster validation
- distributed systems
- mandatory access control
- multilevel secure
- information systems
- access rights