Login / Signup
How to Ask for Permission.
Adrienne Porter Felt
Serge Egelman
Matthew Finifter
Devdatta Akhawe
David A. Wagner
Published in:
HotSec (2012)
Keyphrases
</>
access control
third party
security policies
role based access control
machine learning
information systems
databases
real world
artificial intelligence
decision making
case study
fine grained