Sciweavers

2 search results - page 1 / 1
» An Approach to Security Policy Configuration Using Semantic ...
Sort
View
DBSEC
2009
122views Database» more  DBSEC 2009»
13 years 6 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
CCS
2008
ACM
13 years 6 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...