2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL) 2012
DOI: 10.1109/estel.2012.6400092
|View full text |Cite
|
Sign up to set email alerts
|

Conflict detection in security policies using Semantic Web technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…An interest in anomaly detection for access control policies has grown also in the computer security community [4,[8][9][10].…”
Section: Related Workmentioning
confidence: 99%
“…An interest in anomaly detection for access control policies has grown also in the computer security community [4,[8][9][10].…”
Section: Related Workmentioning
confidence: 99%
“…The risks are then greater and different from those of classical operating systems [2]. The frequent installation of external code creates an important threat.…”
Section: Introductionmentioning
confidence: 98%
“…Analyzing inconsistent and conflicting situations in security policies is an important area of research and many proposals exist. Several approaches are focused on detecting specific kinds of problems [7,9,11,10,2], while others are interested in fixing these problems [8,5,14,6,12]. We consider inconsistencies, or conflicts, or undefined requests, called problems here, as they lead to bugs or security leaks.…”
Section: Introductionmentioning
confidence: 99%