Login / Signup

A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.

Yuanbo GuoJianfeng Ma
Published in: HICSS (2005)
Keyphrases
  • distributed environment
  • distributed systems
  • security requirements
  • distributed databases
  • access control policies
  • database
  • databases
  • distributed data mining
  • peer to peer
  • intelligent systems