Login / Signup
Towards a credential-based implementation of compound access control policies.
Joachim Biskup
Sandra Wortmann
Published in:
SACMAT (2004)
Keyphrases
</>
access control
access control policies
trust negotiation
automated trust negotiation
conflict resolution
security policies
artificial intelligence
computer systems
intrusion detection
fine grained
security mechanisms