Login / Signup
An MSLS-EMM for enforcing confidentiality in malicious environments.
Bei Wang
Jim Alves-Foss
Published in:
Communication, Network, and Information Security (2006)
Keyphrases
</>
computer vision
global consistency
real time
neural network
information systems
databases
data mining
information retrieval
artificial intelligence
access control
dynamic environments
highly dynamic