Login / Signup
Modeling, Specifying and Implementing Workflow Security in Cyberspace.
Ehud Gudes
Martin S. Olivier
Reind P. van de Riet
Published in:
J. Comput. Secur. (1999)
Keyphrases
</>
information security
intrusion detection
databases
data flow
neural network
statistical databases
security issues
data mining
access control
petri net
information flow
sensitive data
computer security
security problems
security threats