Login / Signup

Symbolic analysis of network security policies using rewrite systems.

Tony BourdierHoratiu Cirstea
Published in: PPDP (2011)
Keyphrases
  • security policies
  • data mining
  • distributed systems
  • access control
  • rewrite systems
  • databases
  • data analysis
  • peer to peer