Login / Signup
Symbolic analysis of network security policies using rewrite systems.
Tony Bourdier
Horatiu Cirstea
Published in:
PPDP (2011)
Keyphrases
</>
security policies
data mining
distributed systems
access control
rewrite systems
databases
data analysis
peer to peer