Date of this Version
This paper deals with finding the maximum number of security policies without conflicts. By doing so we can remove security loophole that causes security violation. We present the problem of maximum compatible security policy and its relationship to the problem of maximum acyclic subgraph, which is proved to be NP-hard. Then we present a polynomial-time approximation algorithm and show that our result has approximation ratio for any integer with complexity .
Creative Commons License
This work is licensed under a Creative Commons Attribution 2.0 License.
Huang, Scott C-H; Makki, Kia; and Pissinou, Nikki, "On Optimizing Compatible Security Policies in Wireless Networks" (2006). Telecommunications and Information Technology Institute. 1.
In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/
This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).