Login / Signup
The Design and Implementation of a Multilevel Secure Log Manager.
Vikram R. Pesati
Thomas E. Keefe
Shankar Pal
Published in:
IEEE Symposium on Security and Privacy (1997)
Keyphrases
</>
data mining
multilevel secure
peer to peer
access control
context aware
software architecture
multilevel security