Enforcing Security Policies for Distributed Objects Applications (Discussion).
Bogdan C. PopescuPublished in: Security Protocols Workshop (2003)
Keyphrases
- security policies
- distributed systems
- access control
- network security
- security requirements
- access control systems
- computer networks
- distributed environment
- access control policies
- d objects
- security management
- security concerns
- peer to peer
- database systems
- information systems
- machine learning
- heterogeneous networks
- loosely coupled
- cyber attacks
- real world