Login / Signup

Extended DACS Scheme Implementing Security Function.

Kazuya OdagiriRihito YaegashiMasaharu TadauchiNaohiro Ishii
Published in: ICNS (2007)
Keyphrases
  • dacs scheme
  • security policies
  • intrusion detection
  • network security
  • access control
  • data mining
  • information security
  • information technology
  • network management
  • security requirements