Login / Signup

The Design and Implementation of a Multilevel Secure Log Manager.

Vikram R. PesatiThomas E. KeefeShankar Pal
Published in: IEEE Symposium on Security and Privacy (1997)
Keyphrases
  • data mining
  • multilevel secure
  • peer to peer
  • access control
  • context aware
  • software architecture
  • multilevel security