Login / Signup
Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses.
Tsau Young Lin
Published in:
DBSec (2003)
Keyphrases
</>
security policies
information flows
access control
data mining
information systems
decision support system