Security policy implementation using connection and event log to achieve network access control.
Shalvi DaveJimit MahadeviaBhushan TrivediPublished in: ACAI (2011)
Keyphrases
- security policies
- access control
- network management
- event logs
- security architecture
- security management
- fine grained
- access control systems
- security requirements
- access control policies
- network security
- dynamic access control
- data security
- security model
- security mechanisms
- multilevel secure
- computer networks
- network traffic
- distributed systems
- access control mechanism
- unauthorized access
- access control models
- peer to peer
- databases
- role based access control
- database systems
- information systems