Login / Signup
Permissions and Obligations.
L. Thorne McCarty
Published in:
IJCAI (1983)
Keyphrases
</>
access control
deontic logic
agent architecture
update semantics
artificial neural networks
data security
artificial intelligence
role based access control
normative systems
database
security model
security policies
expert systems
case study
social networks
databases
data sets