Security Policy Descriptions Through the Use of Control Structure of a Target Program.
Hirotake AbeKazuhiko KatoPublished in: ISSS (2003)
Keyphrases
- control structure
- security policies
- intermediate level
- image interpretation
- control structures
- access control
- image understanding
- security management
- network security
- production system
- security requirements
- security concerns
- distributed systems
- home network
- reactive planning
- high level
- network management
- manufacturing systems
- knowledge representation
- access control systems
- unauthorized access
- multi modal
- access control policies
- event logs
- expert systems
- reinforcement learning
- database systems