Login / Signup

On Runtime Enforcement via Suppressions.

Luca AcetoIan CassarAdrian FrancalanzaAnna Ingólfsdóttir
Published in: CONCUR (2018)
Keyphrases
  • access control
  • sensitive information
  • real time
  • machine learning
  • information systems