Date of this Version
This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible security policy and its relationship to the problem of maximum acyclic subgraph, which is proved to be NP-hard. Then we present a polynomial-time approximation algorithm and show that our result has approximation ratio for any integer with complexity .
Huang, Scott C-H; Makki, Kia; and Pissinou, Nikki, "On Optimizing Compatible Security Policies in Wireless Networks" (2006). Telecommunications and Information Technology Institute. 1.