Login / Signup
A comparison of trusted X security policies, architectures, and interoperability.
Jeffrey Picciotto
Jeremy Epstein
Published in:
ACSAC (1992)
Keyphrases
</>
security policies
access control
security management
distributed systems
security requirements
security concerns
distributed environment
network security
access control systems
web services
access control policies
access control mechanism
semantic web
metadata
security mechanisms
object oriented
home network