Anomaly Discovery and Resolution in MySQL Access Control Policies.
Mohamed ShehabSaeed Al-HajSalil BhagurkarEhab Al-ShaerPublished in: DEXA (2) (2012)
Keyphrases
- access control policies
- conflict resolution
- access control
- access control systems
- security policies
- distributed environment
- database design
- extended logic programs
- anomaly detection
- database applications
- trust negotiation
- knowledge discovery
- network traffic
- automated trust negotiation
- security mechanisms
- data mining
- fine grained
- intrusion detection
- role based access control
- database systems
- databases
- information flow
- management system