Login / Signup
Integrating security policies via Container Portable Interceptors.
Tom Ritter
Rudolf Schreiner
Ulrich Lang
Published in:
ARM@Middleware (2005)
Keyphrases
</>
security policies
access control
network security
security management
distributed systems
security requirements
access control systems
security concerns
cyber attacks
fine grained
home network
database
lightweight
container terminal
data mining techniques
model based testing