Login / Signup

Reasoning on the usage control security policies over data artifact business process models.

Montserrat EstañolÁngel Jesús Varela-VacaMaría Teresa Gómez LópezErnest TenienteRafael M. Gasca
Published in: Comput. Sci. Inf. Syst. (2022)
Keyphrases
  • database
  • security policies
  • data analysis
  • data processing
  • data collection
  • access control
  • data sources
  • operating system
  • business processes
  • network security