Login / Signup
Logical Approaches to Authorization Policies.
Steve Barker
Published in:
Logic Programs, Norms and Action (2012)
Keyphrases
</>
machine learning
fine grained
strengths and weaknesses
database
data sets
social networks
feature selection
search algorithm
probabilistic model
sufficient conditions