Logical resolving for security evaluation

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper discusses approach for testing security policies enforcement and weakness and enterprises it's implementation for keeping assurance in system protection. Using such techniques it is possible to examine the protections of thousands of security-related objects on a multi-user system and identify security drawbacks. By acting on this information, security officer or system administrator can significantly reduce their system security exposure. The document examines theoretical foundations for design the safety evaluation toolkit. Finally, paper describes a functional structure of the integrated evaluation workshop based on the security analyzing kernel. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Zegzhda, P. D., Zegzhda, D. P., & Kalinin, M. O. (2003). Logical resolving for security evaluation. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. https://doi.org/10.1007/978-3-540-45215-7_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free