Sign in

Explicit Delegation Using Configurable Cookies.

David Llewellyn-JonesGraeme JenkinsonFrank Stajano
Published in: Security Protocols Workshop (2016)
Keyphrases
  • access control
  • real time
  • database systems
  • data sets
  • cooperative
  • conflict resolution
  • neural network
  • machine learning
  • probabilistic model
  • access control systems
  • adjustable autonomy