Login / Signup
Concealing Complex Policies with Hidden Credentials.
Robert W. Bradshaw
Jason E. Holt
Kent E. Seamons
Published in:
IACR Cryptol. ePrint Arch. (2004)
Keyphrases
</>
case study
complex data
databases
genetic algorithm
high level
multiscale
higher level
complex systems
real world
data mining
expert systems
access control policies