Login / Signup

Automata-based approach to design and analyze security policies.

Wadie KrombiMohammed ErradiAhmed Khoumsi
Published in: PST (2014)
Keyphrases
  • security policies
  • access control
  • cellular automata
  • database
  • security management
  • information systems
  • database systems
  • data model
  • software engineering
  • dimensionality reduction
  • regular expressions
  • security concerns