Login / Signup
Real-time optimisation of access control lists for efficient Internet packet filtering.
Vic Grout
John McGinn
John N. Davies
Published in:
J. Heuristics (2007)
Keyphrases
</>
access control
security mechanisms
fine grained
data security
dynamic access control
security policies
access control policies
role based access control
security requirements
rbac model
information systems
access control mechanism
access control models