Inconsistency Detection System for Security Policy and Firewall Policy.
Yi YinXiaodong XuYoshiaki KatayamaNaohisa TakahashiPublished in: ICNC (2010)
Keyphrases
- security policies
- network security
- access control policies
- access control
- security architecture
- xml access control
- security concerns
- security management
- intrusion detection
- anomaly detection
- unauthorized access
- network management
- security requirements
- distributed systems
- network traffic
- home network
- optimal policy
- fine grained
- packet filtering
- database systems
- query processing
- intrusion detection system
- relational databases
- access control systems
- information systems