Login / Signup
Transforming commodity security policies to enforce Clark-Wilson integrity.
Divya Muthukumaran
Sandra Julieta Rueda
Nirupama Talele
Hayawardh Vijayakumar
Jason Teutsch
Trent Jaeger
Published in:
ACSAC (2012)
Keyphrases
</>
security policies
access control
distributed systems
security management
network security
security concerns
security requirements
access control systems
multilevel secure
home network
access control policies
unauthorized access
integrity constraints
learning classifier systems
cyber attacks
trusted computing