Login / Signup

An authentication model for delegation, attribution and least privilege.

Ebrima N. CeesayCoimbatore ChandersekaranWilliam R. Simpson
Published in: PETRA (2010)
Keyphrases
  • data sets
  • high level
  • reinforcement learning
  • maximum likelihood
  • theoretical analysis
  • computational model
  • decision making
  • face recognition
  • probabilistic model
  • access control
  • mathematical model
  • statistical model