Search results
-
-
Title
-
Clustering and Recommendation Techniques for Access Control Policy Management
-
Author
-
Marouf, Said
-
Date Created
-
2012
-
Subjects--Topical
-
Information technology
-
Description
-
Managing access control policies can be a daunting process, given the frequent policy decisions that need to be made, and the potentially large number of policy rules involved. Policy management includes, but is not limited to: policy optimization...
-
-
Title
-
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
-
Author
-
Xu, Wenjuan
-
Date Created
-
2010
-
Subjects--Topical
-
Information technology
-
Description
-
Determining whether a given policy meets a site's high-level security goals has been a challenging task, due to the low-level nature and complexity of the policy language, various security requirements and the multiple policy violation patterns. I...
-
-
Title
-
User Centric Policy Management
-
Author
-
Cheek, Gorrell
-
Date Created
-
2013
-
Subjects--Topical
-
Information technology
-
Description
-
Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protect...