Login / Signup
Whom to Trust? Generating WS-Security Policies Based on Assurance Information.
Ivonne Thomas
Robert Warschofsky
Christoph Meinel
Published in:
ECOWS (2011)
Keyphrases
</>
security policies
distributed systems
access control
computer systems
service oriented
database
real world
association rules
privacy concerns