Validating Security Policy Conformance with WS-Security Requirements.
Fumiko SatohNaohiko UramotoPublished in: IWSEC (2010)
Keyphrases
- security requirements
- security policies
- access control
- security concerns
- network security
- security management
- security analysis
- rbac model
- distributed systems
- security model
- security properties
- security mechanisms
- data security
- access control policies
- secure electronic
- databases
- business process
- fine grained
- intrusion detection