Login / Signup
Context-Based Constraints in Security: Motivations and First Approach.
Ghita Kouadri Mostéfaoui
Patrick Brézillon
Published in:
Electron. Notes Theor. Comput. Sci. (2006)
Keyphrases
</>
information security
constraint programming
security issues
intrusion detection
network security
security management
data sets
access control
security policies
statistical databases
computer security
data security
security systems
security level
cryptographic protocols