Login / Signup
A protection model incorporating both authorization and constraints.
Atika Laribi
Dennis G. Kafura
Published in:
Comput. Secur. (1992)
Keyphrases
</>
theoretical analysis
high level
probability distribution
computational model
neural network
similarity measure
distributed systems
bayesian networks
probabilistic model
access control
theoretical framework
statistical model
closed form
neural network model
simulation model