Login / Signup
Checking Security Policy Compliance
Vaibhav Gowadia
Csilla Farkas
Michiharu Kudo
Published in:
CoRR (2008)
Keyphrases
</>
security policies
access control
network security
security management
distributed systems
security requirements
home network
network management
access control systems
security concerns
access control policies
ubiquitous computing environments
security architecture
security measures
network access
databases
third party
intrusion detection
dimensionality reduction
information systems