Verifying the Consistency of Security Policies by Abstracting into Security Types.
Kouichi OnoYuichi NakamuraFumiko SatohTakaaki TateishiPublished in: ICWS (2007)
Keyphrases
- security policies
- access control
- security management
- security requirements
- network security
- security concerns
- distributed systems
- network management
- access control systems
- cyber attacks
- fine grained access control
- ubiquitous computing environments
- access control policies
- unauthorized access
- multilevel secure
- security measures
- access control mechanism
- data security
- data mining
- database
- information systems