Login / Signup
Reliable Process for Security Policy Deployment.
Stere Preda
Nora Cuppens-Boulahia
Frédéric Cuppens
Joaquín García-Alfaro
Laurent Toutain
Published in:
SECRYPT (2007)
Keyphrases
</>
xml documents
security policies
process model
machine learning
access control
network security
database
knowledge discovery