An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solver.
Yi YinYuichiro TateiwaYun WangYoshiaki KatayamaNaohisa TakahashiPublished in: ICCCS (2) (2017)
Keyphrases
- detection method
- security policies
- network security
- access control policies
- unauthorized access
- access control
- security architecture
- xml access control
- constraint satisfaction problems
- detection algorithm
- security management
- intrusion detection system
- intrusion detection
- security requirements
- security concerns
- network traffic
- network management
- computer networks
- face detection
- constraint solving
- distributed systems
- anomaly detection
- feature detection
- information security
- constraint satisfaction
- clause learning
- access control mechanism
- home network
- saliency detection
- constraint propagation
- constraint programming
- data processing
- data mining
- three dimensional
- machine learning