Sign in

Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses.

Tsau Young Lin
Published in: DBSec (2003)
Keyphrases
  • security policies
  • information flows
  • access control
  • data mining
  • information systems
  • decision support system