Login / Signup
Runtime Enforcement of Dynamic Security Policies.
José Miguel Horcas
Mónica Pinto
Lidia Fuentes
Published in:
ECSA (2014)
Keyphrases
</>
information systems
security policies
access control
network security
access control policies
xml access control
security management
security concerns
database
real world
security requirements
mandatory access control
data security
access control systems