Overview
Security Management
Agent-based Model
Event-based Model
Policy-based Model
Conclusions and Future Work
Karima Boudaoud
&
Charles McCN
2 of 14