Checking Security Policy Compliance
Vaibhav GowadiaCsilla FarkasMichiharu KudoPublished in: CoRR (2008)
Keyphrases
- security policies
- access control
- network security
- security management
- distributed systems
- security requirements
- home network
- network management
- access control systems
- security concerns
- access control policies
- ubiquitous computing environments
- security architecture
- security measures
- network access
- databases
- third party
- intrusion detection
- dimensionality reduction
- information systems