Login / Signup

Affine Refinement Types for Authentication and Authorization.

Michele BugliesiStefano CalzavaraFabienne EignerMatteo Maffei
Published in: TGC (2012)
Keyphrases
  • access control
  • image registration
  • security requirements
  • neural network
  • database
  • data sets
  • identity management
  • trust negotiation