Login / Signup
Generating Permission-Based Security Policies.
Xin Li
Hua Vy Le Thanh
Yuxin Deng
Julian Dolby
Published in:
DSA (2018)
Keyphrases
</>
security policies
access control
network security
security management
security requirements
distributed systems
security concerns
access control policies
access control systems
computer networks
multilevel secure
home network
fine grained
information security
model based testing