Login / Signup
Automata-based approach to design and analyze security policies.
Wadie Krombi
Mohammed Erradi
Ahmed Khoumsi
Published in:
PST (2014)
Keyphrases
</>
security policies
access control
cellular automata
database
security management
information systems
database systems
data model
software engineering
dimensionality reduction
regular expressions
security concerns