Login / Signup
Enforcing "sticky" security policies throughout a distributed application.
David W. Chadwick
Stijn F. Lievens
Published in:
Middleware Security (2008)
Keyphrases
</>
security policies
distributed systems
network security
access control
data mining
information systems
association rules
data management
database applications
computer networks
computing environments