Date of this Version
4-20-2006
Document Type
Article
Abstract
This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible security policy and its relationship to the problem of maximum acyclic subgraph, which is proved to be NP-hard. Then we present a polynomial-time approximation algorithm and show that our result has approximation ratio for any integer with complexity .
Creative Commons License
This work is licensed under a Creative Commons Attribution 2.0 License.
Recommended Citation
Huang, Scott C-H; Makki, Kia; and Pissinou, Nikki, "On Optimizing Compatible Security Policies in Wireless Networks" (2006). Telecommunications and Information Technology Institute. 1.
https://digitalcommons.fiu.edu/it2_fac/1
Rights Statement
In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
Comments
This article was originally published in Biomed EURASIP Journal on Wireless Communications and Networking 2006, 2006:023728