Verifying Security Policies Using Host Attributes.
Cornelius DiekmannStephan-Alexander PosseltHeiko NiedermayerHolger KinkelinOliver HankaGeorg CarlePublished in: FORTE (2014)
Keyphrases
- security policies
- access control
- security management
- distributed systems
- network security
- access control systems
- security concerns
- security requirements
- access control policies
- attribute values
- home network
- dacs scheme
- unauthorized access
- fine grained
- machine learning
- operating system
- intrusion detection
- data model
- query processing
- databases