Delegation Active Certificates: Protocols and Privilege Management.
Kailash BhoopalamRavi MukkamalaPartha S. PeddiPublished in: CCCT (1) (2004)
Keyphrases
- access control
- security policies
- access control policies
- role based access control
- management system
- network management
- knowledge management
- information management
- data processing
- network security
- access control systems
- conflict resolution
- decision support
- data management
- decision making
- information systems
- distributed systems
- trust relationships
- database