Security Policy Consistency

Computer Science – Logic in Computer Science

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

To appear in the first CL2000 workshop on Rule-Based Constraint Reasoning and Programming

Scientific paper

With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and between security policies and other specifications, namely workflow specifications. Although the problem of security conflicts has been addressed by several authors, to our knowledge none has addressed the general problem of security inconsistencies, on its several definitions and target specifications.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Security Policy Consistency does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Security Policy Consistency, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security Policy Consistency will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-528641

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.