Login / Signup

Program Transformations under Dynamic Security Policies.

Massimo BartolettiPierpaolo DeganoGian Luigi Ferrari
Published in: Electron. Notes Theor. Comput. Sci. (2004)
Keyphrases
  • security policies
  • access control
  • security requirements
  • security management
  • network security
  • distributed systems
  • database
  • information systems
  • knowledge management
  • e government
  • peer to peer
  • access control systems