Login / Signup
Expressive Authorization Policies using Computation Principals.
Anitha Gollamudi
Stephen Chong
Published in:
SACMAT (2023)
Keyphrases
</>
access control
role based access control
fine grained
access control policies
machine learning
optimal policy
intrusion detection
artificial agents
real time
artificial intelligence
knowledge base
case study
reinforcement learning
data structure
parallel computation