Login / Signup

Iterative enforcement by suppression: Towards practical enforcement theories.

Nataliia BielovaFabio Massacci
Published in: J. Comput. Secur. (2012)
Keyphrases
  • access control
  • digital rights
  • data sets
  • real time
  • real world
  • case study
  • artificial neural networks
  • evolutionary algorithm
  • e government
  • edge detection
  • theoretical framework