Login / Signup

On the sequence of authorization policy transformations.

Yun BaiYan ZhangVijay Varadharajan
Published in: Int. J. Inf. Sec. (2005)
Keyphrases
  • access control
  • access control policies
  • fine grained
  • rbac model
  • information security
  • conflict resolution
  • trust negotiation
  • neural network
  • data mining
  • genetic algorithm
  • multi agent
  • optimal policy
  • multi domain