An Approach to Security Policy Configuration Using Semantic Threat Graphs.
Simon N. FoleyWilliam M. FitzgeraldPublished in: DBSec (2009)
Keyphrases
- security policies
- access control
- security management
- network security
- security requirements
- security concerns
- unauthorized access
- network management
- distributed systems
- security architecture
- access control systems
- ubiquitous computing environments
- security measures
- real world
- countermeasures
- anomaly detection
- semantic web
- access control policies
- machine learning
- home network