Maintaining Consistency of the Security Policy using Timestamp Ordering.
Sudsanguan NgamsuriyarojAli R. HursonThomas F. KeefePublished in: ITCC (2002)
Keyphrases
- security policies
- maintaining consistency
- access control
- network security
- security management
- security requirements
- distributed systems
- network management
- data warehouse
- security concerns
- home network
- access control systems
- operating system
- ubiquitous computing environments
- security architecture
- intrusion detection
- information security
- metadata
- access control policies
- event logs
- access control mechanism
- relational databases