Login / Signup
Certificate-based authorization policy in a PKI environment.
Mary R. Thompson
Abdelilah Essiari
Srilekha Mudumbai
Published in:
ACM Trans. Inf. Syst. Secur. (2003)
Keyphrases
</>
access control
public key infrastructure
security policies
fine grained
rbac model
optimal policy
access control policies
real time
mobile robot
dynamic environments
intrusion detection
public key
security mechanisms
service platform