Login / Signup
A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications.
Yehia Elrakaiby
Yves Le Traon
Published in:
ARES (2013)
Keyphrases
</>
security policies
access control
ubiquitous computing environments
network security
access control mechanism
security management
security requirements
real time
security concerns
management system
distributed systems
software architecture
access control systems
information systems
monitoring system
fine grained
cyber attacks
home network
databases
unsupervised learning
machine learning
real world