Login / Signup

Hidden access control policies with hidden credentials.

Keith B. FrikkenMikhail J. AtallahJiangtao Li
Published in: WPES (2004)
Keyphrases
  • access control policies
  • access control
  • conflict resolution
  • security policies
  • trust negotiation
  • distributed environment
  • fine grained
  • web services
  • data mining
  • artificial intelligence
  • data model