Validation of IS Security Policies Featuring Authorisation Constraints.
Yves LedruAkram IdaniJérémy MilhauNafees QamarRégine LaleauJean-Luc RichierMohamed-Amine LabiadhPublished in: Int. J. Inf. Syst. Model. Des. (2015)
Keyphrases
- security policies
- access control
- network security
- model based testing
- security management
- security requirements
- distributed systems
- access control policies
- security concerns
- access control systems
- home network
- unauthorized access
- computer networks
- multilevel secure
- feature selection
- fine grained
- knowledge discovery
- real world
- cyber attacks
- xml documents