Login / Signup
Modelling and Deploying Security Policies.
Xabier Larrucea
Rubén Alonso
Published in:
WEBIST (2009)
Keyphrases
</>
security policies
access control
network security
security requirements
security management
distributed systems
security concerns
access control policies
access control systems
cyber attacks
unauthorized access
database
feature selection
object recognition
expectation maximization