Login / Signup
Evaluating the capability and performance of access control policy verification tools.
Ang Li
Qinghua Li
Vincent C. Hu
Jia Di
Published in:
MILCOM (2015)
Keyphrases
</>
access control policies
access control
conflict resolution
distributed environment
security policies
artificial intelligence
database systems
peer to peer
computer networks