Login / Signup
Hidden access control policies with hidden credentials.
Keith B. Frikken
Mikhail J. Atallah
Jiangtao Li
Published in:
WPES (2004)
Keyphrases
</>
access control policies
access control
conflict resolution
security policies
trust negotiation
distributed environment
fine grained
web services
data mining
artificial intelligence
data model