Credentials-Based Authorization: Evaluation and Implementation.
Fred B. SchneiderPublished in: ICALP (2007)
Keyphrases
- access control
- efficient implementation
- trust negotiation
- comparative evaluation
- evaluation methods
- genetic algorithm
- data structure
- management system
- information retrieval systems
- clustering algorithm
- information systems
- evaluation criteria
- parallel implementation
- data sets
- implementation details
- evaluation process
- real time