The paper discusses approach for testing security policies enforcement and weakness and enterprises it's implementation for keeping assurance in system protection. Using such techniques it is possible to examine the protections of thousands of security-related objects on a multi-user system and identify security drawbacks. By acting on this information, security officer or system administrator can significantly reduce their system security exposure. The document examines theoretical foundations for design the safety evaluation toolkit. Finally, paper describes a functional structure of the integrated evaluation workshop based on the security analyzing kernel. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Zegzhda, P. D., Zegzhda, D. P., & Kalinin, M. O. (2003). Logical resolving for security evaluation. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. https://doi.org/10.1007/978-3-540-45215-7_12
Mendeley helps you to discover research relevant for your work.