2018
DOI: 10.1016/j.cose.2017.10.012
|View full text |Cite
|
Sign up to set email alerts
|

Automatic security policy enforcement in computer systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…General Model: To propose a protection model, the following elements were taken from the references: the qualitative criteria of cyberattack were considered [24]; user behavior was considered for access control [29]; the criteria of levels of responsibility were adopted [37]; the application of security policies was considered [39]; [31] and the [36] use of phases for attack and response detection was considered.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…General Model: To propose a protection model, the following elements were taken from the references: the qualitative criteria of cyberattack were considered [24]; user behavior was considered for access control [29]; the criteria of levels of responsibility were adopted [37]; the application of security policies was considered [39]; [31] and the [36] use of phases for attack and response detection was considered.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
“…General prototype of a Network: Models, network architecture and services that protect information from the following references [11], [14], [30] and [39] were considered; Server protection was decided as they do in [32], [33] and [34] to continue providing services offered by an organization through its applications.…”
Section: Methodology To Generate Resultsmentioning
confidence: 99%
See 3 more Smart Citations