Event correlation, extra information and merged policies approaches for integrating intrusion detection and access control systems.
Computer security aims to provide data with three security services namely confidentiality, integrity and availability to protect the data from unauthorized access (or use), unauthorized modification and denial of access, respectively. Access control and intrusion detection systems are used in isola...
المؤلفون الرئيسيون: | Halboob, Waleed, Alghathbar, Khaled S., Mamat, Ali, Mahmod, Ramlan, Shamsuddin, Solahuddin |
---|---|
التنسيق: | مقال |
اللغة: | English English |
منشور في: |
International Information Institute
2013
|
الوصول للمادة أونلاين: | http://psasir.upm.edu.my/id/eprint/30646/1/Event%20correlation.pdf |
مواد مشابهة
-
TC-enabled and distributed cloud computing access control model
حسب: Halboob, Waleed, وآخرون
منشور في: (2014) -
Trusted-based scalable access control model for broadcast XML documents.
حسب: Halboob, Waleed, وآخرون
منشور في: (2013) -
Push-based XML access control policy languages: a review
حسب: Halboob, Waleed Abduljabbar Mohammed, وآخرون
منشور في: (2014) -
A distributed push-based XML access control model for better scalability
حسب: Halboob, Waleed Abduljabbar Mohammed, وآخرون
منشور في: (2008) -
Temporal, delegable and cheap update access control to published XML documents.
حسب: Halboob, Waleed, وآخرون
منشور في: (2013)