U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Conference Paper

Vulnerability Hierarchies in Access Control Configurations

Published: December 27, 2011

Author(s)

Richard Kuhn (NIST)

Conference

Name: 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 2011
Dates: 10/31/2011 - 11/01/2011
Location: Arlington, Virginia, United States
Citation: 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG 2011), pp. 1-9

Abstract

Keywords

access control; change impact analysis; configuration analysis
Control Families

None selected

Documentation

Publication:
https://doi.org/10.1109/SafeConfig.2011.6111679

Supplemental Material:
Preprint (pdf)

Document History:
12/27/11: Conference Paper (Final)

Topics

Security and Privacy

access control, vulnerability management