Login / Signup
Producing Hook Placements to Enforce Expected Access Control Policies.
Divya Muthukumaran
Nirupama Talele
Trent Jaeger
Gang Tan
Published in:
ESSoS (2015)
Keyphrases
</>
access control policies
access control
conflict resolution
security policies
access control systems
distributed environment
extended logic programs
fine grained
incomplete information
trust negotiation
data mining
social networks
operating system
security mechanisms
access requests