Login / Signup
Modeling Context-Based Security Policies with Contextual Graphs.
Ghita Kouadri Mostéfaoui
Patrick Brézillon
Published in:
PerCom Workshops (2004)
Keyphrases
</>
security policies
context sensitive
access control
security requirements
distributed systems
network security
data analysis
security management
security concerns
information systems
databases
database systems
computer systems
graph matching
access control systems