Login / Signup
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies.
Ramaswamy Chandramouli
Published in:
ICEC (2004)
Keyphrases
</>
policy enforcement
access control
hybrid models
security management
enterprise network
hybrid model
neural network
security policies
feed forward neural networks
data mining
machine learning
feature space
extensible markup language