Login / Signup
Retrofitting Legacy Code for Authorization Policy Enforcement.
Vinod Ganapathy
Trent Jaeger
Somesh Jha
Published in:
IEEE Symposium on Security and Privacy (2006)
Keyphrases
</>
policy enforcement
access control
fine grained
legacy software
access control policies
security policies
legacy systems
security management
source code
security requirements
role based access control
neural network
enterprise network
distributed systems
reverse engineering