Login / Signup
On the implementation of security policies with adaptative encryption.
Antonio Izquierdo Manzanares
José María Sierra
Joaquín Torres Márquez
Published in:
Comput. Commun. (2006)
Keyphrases
</>
security policies
access control
network security
security management
security concerns
security requirements
access control systems
model based testing
machine learning
information systems
fine grained
computer networks