Keyphrases
- security policies
- access control
- security management
- distributed systems
- network security
- security concerns
- security requirements
- home network
- access control systems
- relational databases
- access control policies
- data security
- multilevel secure
- information security
- fine grained
- conflict resolution
- cyber attacks
- database applications
- access control mechanism
- anomaly detection