Login / Signup
An approach for deploying and monitoring dynamic security policies.
José Miguel Horcas
Mónica Pinto
Lidia Fuentes
Wissam Mallouli
Edgardo Montes de Oca
Published in:
Comput. Secur. (2016)
Keyphrases
</>
security policies
access control
dynamic environments
security requirements
monitoring system
real time
database systems
distributed systems
network security
security management
access control systems
real world
intelligent agents