Login / Signup
Secure Interoperation in Multidomain Environments Employing UCON Policies.
Jianfeng Lu
Ruixuan Li
Vijay Varadharajan
Zhengding Lu
Xiaopu Ma
Published in:
ISC (2009)
Keyphrases
</>
access control
fuzzy neural network
usage control
security mechanisms
data security
access control policies
role based access control
security model
security requirements
security issues
access control models
data sources
neural network
artificial neural networks
input output
multi domain