Login / Signup
Redundant information in an authorization mechanism.
Bob P. Weems
Published in:
Inf. Syst. (1990)
Keyphrases
</>
access control
fine grained
case study
security requirements
data sets
real world
image processing
website
multi agent
probabilistic model
security policies
conflict resolution
selection mechanism
access control mechanism