Login / Signup
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Yuanbo Guo
Jianfeng Ma
Published in:
HICSS (2005)
Keyphrases
</>
distributed environment
distributed systems
security requirements
distributed databases
access control policies
database
databases
distributed data mining
peer to peer
intelligent systems