Login / Signup
Constrained Delegation.
Olav L. Bandmann
Babak Sadighi Firozabadi
Mads Dam
Published in:
IEEE Symposium on Security and Privacy (2002)
Keyphrases
</>
access control
conflict resolution
image processing
relational databases
management system
constrained problems
real time
data sets
neural network
web services
case study
multi agent
cross domain
security policies