Login / Signup
Modeling XACML Security Policies Using Graph Databases.
Fidel Paniagua Diez
Amrutha Chikkanayakanahalli Vasu
Diego Suarez Touceda
José María Sierra Camara
Published in:
IT Prof. (2017)
Keyphrases
</>
security policies
graph databases
access control
access control policies
network security
distributed systems
graph mining
application domains
machine learning
role based access control
random walk
social network analysis
computer networks