Login / Signup

Enforcing "sticky" security policies throughout a distributed application.

David W. ChadwickStijn F. Lievens
Published in: Middleware Security (2008)
Keyphrases
  • security policies
  • distributed systems
  • network security
  • access control
  • data mining
  • information systems
  • association rules
  • data management
  • database applications
  • computer networks
  • computing environments