Policy by Example: An Approach for Security Policy Specification.
Adwait NadkarniWilliam EnckSomesh JhaJessica StaddonPublished in: CoRR (2017)
Keyphrases
- security policies
- access control policies
- access control
- xml access control
- security management
- network security
- security concerns
- distributed systems
- network management
- security architecture
- access control systems
- security requirements
- unauthorized access
- ubiquitous computing environments
- optimal policy
- databases
- conflict resolution
- home network
- multi tier
- access control mechanism
- security measures
- knowledge management
- ambient intelligence