Login / Signup
DB2 security features: label based access control and trusted contexts.
Walid Rjaibi
Igal Ziskind
Mihai Iacob
Published in:
CASCON (2011)
Keyphrases
</>
feature extraction
network connection
feature vectors
feature set
prior knowledge
low level
information security
trusted computing
information systems
image features
access control